This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See Special Administrative Region.
Storage arrays and logical volumes (LVOLs) that are connected to S/390 servers. S/390 storage sometimes also includes zSeries storage. See also zSeries storage.
See storage accounting area.
See SOAP with attachments API for Java.
See software as a service.
See set asynchronous balanced mode.
See set asynchronous balanced mode extended.
See State Adaptive Choreography Language.
See Society of Automotive Engineers.
The time added to a shipping estimate to account for unforeseen circumstances. For example, one day might be added to a delivery date to account for the possibility of encountering bad weather.
See SWIFTAlliance Gateway.
See SQL Access Group's Call Level Interface.
See system adapter identification number.
See secure attention key.
See select application license charge.
A section of the master catalog that contains a flexible structure for customer display purposes. Users can have only one master catalog per store, but can have as many sales catalogs as they want. See also master catalog.
A defined role in WebSphere Commerce that manages order processing, ensuring that orders are properly fulfilled, payment is received, and orders are shipped. The sales manager can search for customer orders, view details, manage order information, and create and edit returns. See also operations manager, order.
Pertaining to communication between entities in the same SNA domain. See also cross-domain.
same origin policy
A policy that ensures that HTML documents or scripts originating from one domain will not be allowed to change a document from another domain. This prevents malicious content from one domain or site from loading into another domain's HTMLs in order to steal data or issue unwelcome transactions.
See Security Assertion Markup Language.
- A group of prospective respondents.
- The data that the product collects for the server.
An event that happens when a situation becomes true. Situations sample data at regular intervals. When the situation is true, it opens an event, which is closed automatically when the situation returns to false.
sample statistics program (DFHOSTAT)
Batch program supplied with CICS which provides information that is useful in calculating the storage requirements of a CICS Transaction Server system, for example, the sizes of the dynamic storage areas.
A store that is created solely for learning purposes. See also sample store.
See service assignment matrix record.
- An area on a file system where a developer can modify and test items in isolation, before returning them to the source control component and sharing them with other developers. A sandbox is a reflection of all or part of a repository workspace on disk.
- A personal workspace used to store data values as a separate layer of only new values which can be merged back into the base data when adjustments are complete.
SAN File System console
A web user interface used to remotely monitor and control the SAN File System with any standard web browser. See also administrative server.
Type that is characterized by the absence of serifs. See also serif.
See store archive.
SAR file format
In WebSphere Commerce, SAR (store archive) is a platform-independent file format that aggregates many files into one. See also store archive.
See Simple Authentication and Security Layer.
See Serial Advanced Technology Attachment.
A DB2 database server that is a member of a group of similar DB2 database servers. Each satellite in the group runs the same application and has a similar configuration to support the application. See also DB2 control server.
A portable telephone that operates on a satellite network instead of a cell network or traditional wired network. Satellite phones are typically used as world phones because they are not limited to the range of a cell (they have worldwide coverage). See also mobile device, mobile phone.
See shared access transport facility.
- The level at which a system no longer operates at its full capacity. See also consumption.
- The amounts of color and gray in a hue that affect its vividness; that is, a hue with high saturation contains more color and less gray than a hue with low saturation.
- To copy specific objects, libraries, or data by transferring them from main storage or auxiliary storage to media such as optical disc, tape, diskette, or a save file. See also restore, save as.
- To make a local copy of a file that is attached to a document.
To create a new object from an existing object and leave the existing object as it was. See also save.
A save conflict occurs when two or more Notes users edit the same document in a Notes database on a server at the same time. The document saved first becomes the main document; subsequent users are prompted to save their changes as responses titled '[Replication or Save Conflict].'
- In Extensions, a set of data configured during an export operation or refresh operation. A user can choose a saved selection and update just the data without reconfiguring the report or export criteria.
- In Contributor, a dynamic group of items from a dimension or e.List.
- In Analyst, a set of data used to save a specific D-cube orientation, including a selection of rows, columns, and pages for later use. The selected items, sort order, and slice of the D-cube are all saved in a named selection.
saved user ID
The user ID that is acquired when running a setuid program. The saved user ID is the same as the owner of the file that ran. If the file that ran was not setuid, the saved user ID is set to the effective user ID of the parent.
- In Backup, Recovery, and Media Services, an online file allocated on direct access storage for use as interim or short-term storage before off-loading to removable media or permanently deleting.
- A file allocated in auxiliary storage that can be used to store saved data on disk (without requiring diskettes or tapes), to do I/O operations from a high-level language program, or to receive objects sent through the network. The system-recognized identifier for the object type is *FILE.
An operation that the user runs to save objects while application programs that change the objects are running. See also dedicated save operation.
See session awareness data.
See Simple API for XML.
See sequential buffering.
See set buffer address.
See Single-Byte Command Code Sets Connection.
See single-byte character set.
See session control.
See Standard Carrier Alpha Code.
- Pertaining to a system's ability to increase its capacity to distribute information or data as demand heightens.
- Pertaining to the capability of a system to adapt readily to a greater or lesser intensity of use, volume, or demand. For example, a scalable system can efficiently adapt to work with larger or smaller networks performing tasks of varying complexity.
scalable distribution infrastructure (SDI)
A solution that ensures fast and reliable software distribution to large numbers of target computers in a variety of topologies. It enables central management of software distribution, and relies on core services such as Tivoli common agent services, the dynamic content delivery, and device manager service to perform the actual software distribution and federated job management operations.
A physical platform that has at least one SMP Expansion Module. Additional attributes are assigned to a physical platform when it is a scalable node. These additional attributes record the number of SMP Expansion Modules, SMP Expansion Ports, and RXE Expansion ports on the physical chassis.
An IBM Director managed object that is used with Scalable Systems Manager. Scalable objects include scalable nodes, scalable systems, scalable partitions, and remote I/O enclosures that are attached to scalable nodes.
An IBM Director managed object that defines the scalable nodes that can run a single image of the operating system. A scalable partition has a single, continuous memory space and access to all associated adapters. A scalable partition is the logical equivalent of a physical platform. Scalable partitions are associated with scalable systems and comprise only the scalable nodes from their associated scalable systems.
An IBM Director managed object that consists of scalable nodes and the scalable partitions that are composed of the scalable nodes in the scalable system. When a scalable system contains two or more scalable nodes, the servers that they represent must be interconnected through their SMP Expansion Modules to make a multinode configuration, for example, a 16-way xSeries 455 server made from four scalable nodes.
- An arithmetic object, an enumerated object, or a pointer to an object.
- Pertaining to a single data item.
- A type of program object that contains either string or numeric data. It provides the byte string it is mapped to with representation and operational characteristics. See also pointer.
- A quantity characterized by a single value. See also array, vector.
A fullselect that returns a single value: one row of data that consists of exactly one column. See also fullselect.
An SQL function that optionally accepts arguments and that returns a single scalar value each time that it is invoked. A scalar function can be referenced in an SQL statement wherever an expression is valid. See also function, routine.
An instruction, such as a load, store, arithmetic, or logical instruction, that operates on a scalar. See also vector instruction.
- A type that defines a variable containing a single value at run time.
- In ADA programming, a type in which values are ordered. However, neither an object nor a value of a scalar type have components.
- A graphical representation of a chart axis.
- The number of digits in the fractional part of a number.
- In the GDDM function, to enlarge an image or marker.
- The increments of measure used by the nroff and troff commands. All supported scales are converted for the typesetter into a scale called machine units (u).
- In the GDDM function, the number and progression of ticks along a vertical or horizontal axis.
- The magnitude of a stored number. Storing numbers with precision and scale allows a wide range of numbers to be stored in the same amount of space, but large numbers are not stored as exact integers.
- A number used as a multiplier in scaling.
- A number that indicates the position of the decimal point in a real number.
- In programming, the process of indicating the number of digit positions in object code to be occupied by the fractional portion of a fixed-point or floating-point constant.
- A process by which an image is reduced or enlarged in size to fit a given area on the display.
- In computer graphics, the process of enlarging or reducing all or part of a display image by multiplying the coordinates of the image by a constant value.
- In GL, the action of uniformly stretching a primitive along an axis.
- The throughput of a workload on a multiprocessor divided by the throughput of that workload on a comparable uniprocessor (not on a single-processor SMP system).
- The conversion factor from output engineering units to user-specified units.
- In FOCA, the ratio of horizontal to vertical scaling of the graphic characters.
- In architecture, the ratio of an image-object-area size to its image-presentation-space size.
- To systematically search a computer or a network for information about hardware, software, or configuration. See also network scan, software scan.
- The process of AppScan exploring and testing an application and providing the results.
- To examine sequentially, part by part.
- A data collection job that monitors storage usage and file statistics on the resources in an environment.
An attack in which a host on the network is trying to determine which ports are open on the target host. The host doing the scan may later be the same host that does a more virulent attack.
- An automated security program that searches for software vulnerabilities within web applications.
- For the 3725 communication controller, a processor dedicated to controlling a small number of telecommunication lines. It provides the connection between the line interface coupler hardware and the central control unit.
- A device that examines text, graphics, or bar code patterns and generates electrical signals corresponding to the pattern. It sends the signals to a computing device for processing.
- The software used to gather hardware information and software information from systems and devices.
scanner interface trace
A record of the activity within the communication scanner processor (CSP) for a specified data link between an IBM Communication Controller (including Communications Controller for Linux) and a resource.
A service request that conforms to the Service Component Architecture (SCA). An SCA module routes the request to a service provider, after having done any additional processing specified by the module.
For input and output operations, to read data from a device and locate it in noncontiguous memory addresses. See also gather.
A method of reading contiguous data pages from disk to discontiguous portions of memory. See also block-based I/O.
See Signal Computing bus.
See Standards Council of Canada.
See signaling connection control part.
See source code control system.
- The name assigned to a delta.
- The number assigned to each version of a program.
- An alternative plan or what-if analysis of a possible situation and outcome.
- A specific sequence of actions that illustrates behaviors. A scenario may be used to illustrate an interaction or the execution of one or more use-case instances. See also interaction, use case.
- A set of actions representing a business process within the context of a collaboration. Scenarios can be used to partition collaboration logic. For example, if a collaboration handles one type of business object with various possible verbs, the user might develop Create, Update, and Delete scenarios. See also activity.
- A real or fictitious use case that can be used to validate the behavior of rules with test suites or simulations. Each scenario contains all the necessary information required for rules to execute properly.
- A list of user-defined conditions that can be used to analyze bids.
- A formal description of a hypothetical situation in terms of data and parameters.
- A sequence of events that tests business data models for expected or possible outcomes. The models identify exceptional business conditions.
A lock that prevents a scenario that is being edited or solved by one user in a multi-user environment, from being modified by other users. Scenario locks can be released by users who have been granted the rights to do so.
See security classification guide.
- To request that a task set be started at a particular interval or on occurrence of a specified program interrupt. See also discovery, ping, probe.
- See job stream.
- The time-based constraints for when events will be matched against a rule or SLC and when they will not. Schedules are also used to tell when to run an automated report.
- A planned process that determines how frequently a situation runs with user-defined start times, stop times, and parameters.
- The work orders on a given route assigned to one or more specific crews.
- A content repository object that triggers job execution.
- A database record that describes client operations or administrative commands to be processed. See also administrative command schedule, client schedule.
Any of the items in an outline to be covered, in sequence, during a session that is added to the Scheduled Items folder at the top of the outline. Instructors add scheduled items when developing the course outline before a session begins.
- A batch job that is submitted with a value other than *CURRENT for the schedule date and schedule time parameters.
- A batch job that becomes eligible to run at a specified date and time.
- A computer program that performs functions such as scheduling, initiation, and termination of jobs.
- A Java virtual machine (JVM) service that manages all jobs that are scheduled in the product. The scheduler service administers import and export jobs in the background.
- A multithread, multiprocess background server designed to handle the scheduling and launching of jobs, based on a simple timing scheme. See also broadcast job.
- A service that provides time-dependent services.
scheduler work area (SWA)
An element of the CICS address space. The SWA is made up of subpools 236 and 237 which contain information about the job and the step itself. Almost anything that appears in the job stream for the step creates some kind of control block in this area.
A list of resource names along with their required states. If an MVS image satisfies all of the requirements in the scheduling environment associated with a given unit of work, then that unit of work can be assigned to that MVS image. If any of the requirements are not satisfied, then that unit of work cannot be assigned to that MVS image.
An application program attribute that is defined in the program specification block (PSB) and that specifies how the program should be scheduled if multiple programs are contending for scheduling. See also exclusive intent, read access, read-only access, update intent.
- An element in the resource policy file that defines the default operating system thread priority and scheduling policy to be used for DB2 engine dispatchable units (EDUs) and can also contain EDU-specific thread priorities. See also engine dispatchable unit, resource policy file.
- Information that describes the algorithm that will be used to prioritize threads that are running within the current process or operating system.
- A complete description of all the entity types, link types, and their associated property types that are available for items within a system.
- See SQL schema.
- A collection of database objects such as tables, views, indexes, or triggers that define a database. A schema provides a logical classification of database objects. See also collection.
- A specification for the structure and semantics of some related data. The schema is used to validate or otherwise understand a group of data.
- A group of object classes defined for and applicable to a single namespace.
- See XML schema.
- In Enterprise Service Tools, a logical grouping for user-defined functions, distinct types, triggers, and stored procedures. When an object of one of these types is created, it is assigned to one schema, which is determined by the name of the object. For example, in the service flow project tools, when the developer imports screens, the imported objects are assigned to the .mxsd schema, which is a language for describing XML files that contain schema.
See Structured Call Interface.
- In web services, a property that identifies the lifetime of the object serving the invocation request.
- A reference to the applicability of a policy, at the system, user, or machine level.
- The component of a policy expression that describes the class of resources that is subject to the decision of a policy. In the OGSA Policy Service, scope is the policy discipline and policy role.
- The extent to which the semantic effects of language statements reach. The scope may be to the job or to the activation group.
- A named part of the CICSPlex SM environment that qualifies the context of a CICSPlex SM request. The scope can be the CICSplex itself, a CICS system, a CICS system group, or any set of CICS resources that are defined as a logical scope in a CICSPlex SM resource description. See also context.
- The range of context in a map for which a variable name, identifier, or declaration is valid or can be used.
- The level to which a commitment control definition applies.
- A part of a source program in which an object is defined and recognized.
- In the C language, the range within a program in which a declaration is known.
- In identity management, the set of entities that a policy or an access control item (ACI) can affect.
- The effective range of the enablement of a condition, the establishment of a user-generated routine to handle a condition, or both. Scope can be both statically and dynamically defined. See also namespace scope.
- A specification of the boundary within which system resources can be used.
- The drawing elements, construction, finishing, 3D values, and attributes that can be stored, plotted, manipulated, and deleted. The scope is typically what appears on the screen and can be limited by set, layers, object functions, and functions that control elements, construction, and finishing.
- Information that is used to describe whether the scheduling policy indicates that threads compete directly with other threads within the process or within the system.
scope of control
See network management domain.
scope of reference
The portion of a routine or application program where an identifier can be accessed. Three possible scopes exist: local (applies only in a single statement block), modular (applies throughout a single module), and global (applies throughout the entire program). See also global variable, local variable.
In C++, an operator that defines the scope for the argument on the right: if the left argument is blank, the scope is global; if the left argument is a class name or namespace name, then the scope is within that class or namespace respectively.
- The restriction of a database object view to a specified subset. Further operations, such as update or retrieve, will affect only the cells in the specified subset. For example, scoping allows users to retrieve or update only the sales data values for the first quarter in the east region, if that is the only data they wish to receive.
- A mechanism for controlling multiple sign-ons of the same user ID to one or more CICS regions.
- In the matching process, the result of a match comparison. See also match comparison, matching.
- In data mining, to apply a data mining model to new data, such as to perform predictions or segmentations.
- The result of a computational analysis. See also match comparison, scoring.
- To apply a predictive model to a data set with the intention of producing a classification or prediction for a new, untested case. See also weight.
- In DB2 Text Search and DB2 Net Search Extender, an absolute value of 0 - 1 of type DOUBLE that indicates how well a document meets the search criteria relative to the other found documents. The value indicates the number of matches in the document relative to the size of the document.
- A number or ranking that expresses applicability in relation to a standard.
- A set of measurements on a subject to help to make a business decision. See also scoring strategy.
- A collection of metrics representing the performance of one unit or aspect of an organization.
- A set of chapters and criteria that are assigned weight to evaluate a risk.
- A preconfigured graphical display of one or more configurable parameters and grades. Scorecards are configured to display key performance indicators meaningful to an organization, to which Tealeaf users can apply parameters and comparisons to deliver immediate, meaningful graphical information through the portal.
A property that defines the reasoning strategy and the scoring strategy. Scorecard properties are used together to determine the final score and the reason codes that are displayed.
The process of computing how closely the attributes for an incoming identity match the attributes of an existing entity. See also score.
A strategy to calculate the final score from each of the attribute scores for the overall scorecard. See also scorecard.
See Sharable Content Object Reference Model.
See single copy object store.
- See service control point.
- See System Control Process.
- See secure copy program.
- See Secure Copy Protocol.
See start-control-program-function job.
See sustainable cell rate.
See scratch volume.
A labeled volume that is either blank or contains no valid data, that is not defined, and that is available for use. See also volume.
- See selection.
- The display that the user sees when connected to a 3270 application on the host system. A single 3270 application can include many screens, each of which has a purpose within the context of the application.
- The physical surface of a display device upon which information is shown to a user.
In Enterprise Service Tools, information stored in a recorded screen operations file. The stored information represents a particular user interaction with a screen, such as entering text, pressing an AID key, cursor repositioning, and so on. This stored information can be played back, or executed, on the same host screen to automate that user interaction.
- An XML representation of a host screen, used to create or customize a screen customization or transformation.
- The storage of a screen display as a text or graphics file on disk.
The coordinate system that defines the display screen. In GL, distances are measured in units of pixels, and the origin is in the lower left-hand corner. On most systems the screen size is 1024 pixels high by 1280 pixels wide. The viewport defines the mapping from normalized device coordinates to screen coordinates.
A HATS resource with two parts: a set of screen recognition criteria used to match host screens, and a list of actions to be taken when a host screen matches the screen recognition criteria.
A 3270 terminal service development tool that enables a developer to create and modify recognition profiles for an imported screen and to assign names to the fields on the screen definition.
A type of call transfer in which the transfer of the held party to the third party is completed only if the third party answers the call. See also blind transfer.
screen entry translation object
A translation object that provides a standardized format for entering an EDI document into the Document Editor for translation and transmission to trading partners. The screen entry translation object ensures that users enter all the data necessary to create the required EDI document.
The result of importing a screen definition from a 3270 application into the 3270 terminal service development workbench. A screen file represents a screen definition. The screen definition contains identifiers such as the number of fields on the screen and the row and column position of fields on the screen. There are multiple screen files per 3270 terminal service project. Each screen file can have multiple recognition profiles assigned to it.
The process of importing a screen definition (in its current state) and saving it to a screen file within the 3270 terminal service tools workbench, for the purpose of generating recognition profiles and custom screen records. Use the 3270 terminal service recorder to import screens.
- A workflow that enables the reviewer to screen an entity before executing workflows associated with its disposition phases.
- In a document copying machine, a means of imposing a regular pattern of small dots onto the image of the original in order to produce an improved copy.
In Enterprise Service Tools, a set of screen actions that make up the total user interaction necessary to process a given screen. A screen interaction is restricted to having a single AID key action.
In the service flow project tools of Enterprise Service Tools, an operation that represents all of the possible paths (the allowed user interactions) from a single screen. A screen operation refers to one screen description of a particular state, specifying the screen state, zero to N screen interactions representing the possible user interactions with that screen, and zero to N screen descriptions representing of the potential screen outputs.
screen operations editor
In Enterprise Service Tools, an editor that can be used offline to create operations for each screen description, with associated screen interactions and next screen descriptions.
screen operations file
In Enterprise Service Tools, a file that contains a set of screen operations with no more than one operation corresponding to a given screen description. A screen operations file represents all of the paths (the allowed user interactions) through the screens that are part of a single business function.
A device that renders onscreen text as audible language. See also digital speech synthesizer.
A runtime function that determines the state of a screen and processes the screen in accordance with the identifiers in the recognition profiles. Screen recognition compares the screen as presented by the 3270 application to the defined recognition profiles to determine which screen state applies.
screen recognition criteria
A set of criteria used to determine whether a host screen matches a screen customization and should have that screen customization's actions applied. Screen recognition criteria are also used in the process of recording a macro; in this context they are sometimes called descriptors.
The viewing and controlling of program screens on a computer other than the user's own computer. During a screen-sharing Sametime meeting or Learning Space - Virtual Classroom Live session, one participant shares a screen with the other participants and can allow them to control the program. The program needs to be installed only on the computer of the person who is doing the actual sharing.
See screen coordinates.
The set of conditions (at the time the screen was imported from the host) that determine the allowed and required processing on the screen. A screen state operates on input to change the status, cause an action, or result in a particular output screen. A single screen can have multiple states and the allowed user actions for the screen vary depending on which state the screen is in.
- A series of commands, combined in a file, that carry out a particular function when the file is run. Scripts are interpreted as they are run. See also customer service representative, Tivoli Storage Manager command script.
- An exact text for the Customer Service Representative (CSR) to read to a customer regarding transactions. Scripts can be short-hand or prompts to remind a representative to say certain things to a customer at certain points during a call.
- The logical flow of actions for a 3270 server program.
- A collection of graphic symbols used for writing. A script does not correspond one-to-one with either a language or a country. Members of the same linguistic family can use different scripts. For example, the Latin script is used by most western European languages, while the Arabic script is used in Arabic countries as well as in Iran for Farsi and in Pakistan for Urdu.
scripted OS image
An unattended install action where operating system installation files that are used with some configuration files would install the operating system on the target system using boot server technology.
In the Ada debugger, a file that contains a series of commands that can be used to drive the debugger. Script files are useful for debugging large, complex programs when you may not be able to complete a debugging session in one sitting.
A high-level, application-specific scripting language that consists of statements used to develop 3270 scripts. These scripts are part of the interface between a state table and a 3270-based host business application.
A memory area in which values can be stored and read inside IBM ILOG Script statements (main , execute , and prepare blocks). See also variable.
The formatter component of DCF. SCRIPT/VS provides capabilities for text formatting and document management, macro processing and symbol substitution, and GML tag recognition and processing.
- To move a display image vertically or horizontally to view data that is not otherwise visible in a display screen or window.
- To move a slider interface item vertically on a touchscreen. Typically, apps use scroll gestures to move through a screen of content that is longer than the space allowed onscreen at one time.
A property of a cursor that indicates whether the cursor can fetch in a backward direction. See also fetch orientation.
A cursor that can be used to fetch in backward and forward directions. See also nonscrollable cursor.
A cursor that can fetch the next row in a sequence or any of the output rows. See also sequential cursor.
The portion of the presentation space that is mapped to the viewport at any given time. The window can be moved vertically within the presentation space by scrolling. See also presentation space.
See subcapacity reporting tool.
- An agile software programming method that uses small, self-organizing, cross-functional teams, and iterative, incremental practices.
- A daily, informal meeting between stakeholders in an agile software development project. Participants must include a scrum master, the product owner, and the team and might include the product manager and other stakeholders. See also chicken role, daily wash-up, pig role.
See Signal Computing System Architecture.
See Small Computer System Interface.
See Small Computer System Interface adapter.
SCSI back-end layer
The layer in a Small Computer System Interface (SCSI) network that performs the following functions: controls access to individual storage systems that are managed by the clustered system; receives requests from the virtualization layer, processes them, and sends them to managed disks; and addresses SCSI-3 commands to the storage systems on the storage area network (SAN).
A product, such as a drive or adapter, connected to a host through an I/O interface using the Small Computer System Interface (SCSI) protocol. A SCSI device is either an initiator or a target. See also initiator, Small Computer System Interface.
A standard that defines the protocol used to transfer Small Computer System Interface (SCSI) commands over the transport physical layer of the fibre-channel interface. This standard is published by ANSI as X3.269-1996.
SCSI front-end layer
The layer in a Small Computer System Interface (SCSI) network that receives I/O commands from hosts and provides the SCSI-3 interface to hosts. SCSI logical unit numbers (LUNs) are mapped to volumes in this layer as well. Thus, the layer converts SCSI read and write commands that are addressed to LUNs into commands that are addressed to specific volumes.
SCSI host system
A host system that is attached with a Small Computer System Interface (SCSI). These host systems run on operating systems such as UNIX, OS/400, Windows NT, Windows 2000, or Novell NetWare.
A unique identifier assigned to a Small Computer System Interface (SCSI) device that is used in protocols on the SCSI to identify or select the device. The number of data bits on the SCSI bus determines the number of available SCSI IDs. A wide interface has 16 bits, with 16 possible IDs.
See Server Display Control.
See source distributed data manager.
See sequential dependent segment.
See Screen Definition Facility.
See software development kit.
See data model.
See subject's distinguished name.
A database that is used for storing and serving the Web Services Description Language (WSDL) definitions of web services. For example, the WSDL definitions for service integration bus-enabled web services are stored as service data objects in an SDO repository.
See Session Description Protocol.
See synchronous dynamic random access memory.
See shared dynamic storage area.
See spool data set browse.
See System Display and Search Facility.
See symmetric digital subscriber line.
See small-data-set packing.
See service data unit.
See system dump.
See system diagnostic work area.
See sequential data set system printer.
See Support Element.
- A function or mode that enables the user to locate occurrences of such things as particular character strings, embedded commands, or boldface letters in a document.
- To request the display of objects that meet user-specified criteria.
- In RPG, a literal or field name specified in factor 1 of certain file operations (such as CHAIN) that identifies the record to be processed.
- The conditions specified when searching, consisting of one or several search terms and search parameters.
- The set of one or more data sources and the online index that is created after the search engine crawls those sources. See also cluster collection store, seed.
- A searchable collection of documents that can span multiple content sources. See also search center, search service.
- In Information Integrator for Content, specific fields that an administrator defines for a search template that limit or further define choices available to the users.
- Attribute values that are used to retrieve a stored item.
In a DL/I call, a field that is referred to by one or more segment search arguments (SSAs). See also key field.
For System i Access, a number returned by the system to an application program when the application program requests a search. The search handle is used by the application program to request subsequent searches.
search index database
The database files used by document library services for storing descriptive information about documents and folders (such as keywords, subjects, dates, and so forth). These database files are used when a search of the document library is requested on one or more document descriptors.
- A list of directories searched by the shell when a command path name is not specified.
- A list of the libraries provided to a Rational Team Concert build to locate artifacts for the build, including the load library and object library for an i Project on IBM i.
A service that is used to define the configuration parameters for a search collection. A search service can be local, remote, inside the product, or outside the product. See also search center, search collection.
- A named collection of comparison parameter values that override existing or default values and that are used to conduct a search. For example, existing search strategies include standard (default values), broad (values that widen the search), and narrow (values that restrict a search). Administrators can define their own set of comparison parameter values and save them as a search strategy.
- A methodical and systematic way of exploring the search space. This is materialized as a data structure that is associated with an object, field, or value of a field. It controls the order in which decisions are made by a search engine. See also goal, search space.
- A saved set of attributes that are used to search for items in a catalog or a hierarchy. The search template is used to determine which attributes are visible in the Rich Search panel of the user interface.
- A file that, when opened, prompts the user to enter or change values and then displays a list of the documents that meet the search criteria. See also template.
- A form, consisting of search criteria designed by an administrator, for a specific type of federated search. The administrator also identifies the users and user groups who can access each search template.
search term association
A preset relationship between terms that lead to additional, different, or replacement product suggestions in search results. Search term associations are used as a product recommendation strategy to increase store sales when customers search for products. Search submissions are modified to increase or target search results.
A storage system architecture developed by IBM for open-systems servers, and S/390 and zSeries host systems. It provides storage solutions that integrate software, storage management, and technology for disk, tape, and optical storage.
In time series analysis, the evidence of a repetitive, predictable pattern observed in the data. See also time series analysis.
seasonal usage ratio
The ratio of water usage between defined summer and winter months. The seasonal usage ratio can be used in IBM Work Optimization for Water Utilities to identify seasonal water usage trends.
- See workpoint.
- To fit correctly into position.
- An installation of a licensed program.
See Securities and Exchange Commission.
See security mechanism.
secondary authorization ID
In DB2 for z/OS, an authorization identifier that is associated with a primary authorization ID by an authorization exit routine. See also primary authorization ID.
In the GDDM function, a horizontal or vertical axis drawn parallel to the primary axis and capable of having a title, ticks, and labels different from those of the primary axis. See also primary axis.
secondary cluster caching facility
A standby for the primary cluster caching facility. A secondary cluster caching facility takes over as the primary cluster caching facility if the primary cluster caching facility fails or must be taken offline. See also cluster caching facility, primary cluster caching facility.
One of the devices in a dual-copy or remote-copy logical-volume pair that contains a duplicate of the data on the primary device. Unlike the primary device, the secondary device can accept only a limited subset of channel commands. See also primary device.
secondary end of a session
An end of a session that uses secondary protocols. For an LU-LU session, the secondary end of the session is the secondary logical unit (SLU). See also half-session, primary end of a session, secondary logical unit.
- For certain types of join operations using Query, all files except the first file that are joined in a query definition for the purpose of getting data.
- In RPG, any input file other than the primary file.
- In the DDS for a join logical file, any physical file, other than the first physical file, that is specified on the JFILE keyword. See also primary file.
secondary GPFS cluster configuration server
In a GPFS cluster, the node chosen to maintain the GPFS cluster configuration data in the event that the primary GPFS cluster configuration server fails or becomes unavailable.
secondary group buffer pool
For a duplexed group buffer pool, the structure that is used to back up changed pages that are written to the primary group buffer pool. No page registration or cross-invalidation occurs using the secondary group buffer pool. The z/OS equivalent is "new structure." See also primary group buffer pool.
secondary group layout
The allocation of the graphic characters of group 2 to the keys of a particular keyboard (see ISO/IEC 9995-1). See also alternate layer.
In SNA, the half-session that receives the session-activation request. See also primary half-session.
- In IMS or VSAM, any index used to provide a path for access to a data set other than that provided by the primary keys. See also alternate index.
- A nonpartitioning index on a partitioned table. See also nonpartitioned index.
secondary index database
An index that is used to establish accessibility to a physical or logical database by a path that is different from the one provided by the database definition. A secondary index contains an index pointer segment type that is defined in a secondary index database.
The backup copy of the primary instance of a replicated resource group. The secondary instance of the resource group is intended for data backup purposes. See also replicated resource group.
One or more additional national languages that can be installed on the system to display and print information. See also primary language.
A set of one or more log files used to record changes to a database when the primary log is full. See also primary log.
- In SNA, the logical unit (LU) that contains the secondary half-session for one logical unit-to-logical unit (LU-to-LU) session. See also primary logical unit, secondary end of a session.
- A nonhost port through which the user gains access to the services of the network.
- A name server that gets its domain data from a primary name server by way of a zone transfer.
- A Domino server that can stand in for a Notes user's home server to ensure that the Notes Name Service is always available over TCP/IP.
- The Sterling Connect:Direct node that interacts with the primary node during process execution. See also adjacent node.
- A device that acts as the server node if the primary node is unavailable, that is, offline or down.
A logical partition that has certain dependencies on the primary logical partition, but otherwise is independent from the primary logical partition. For example, a secondary logical partition may be powered off and on, dumped, or installed without affecting other logical partitions.
secondary processing sequence
In a database, the hierarchical order of segment types in a physical or logical database that results automatically when a database is accessed through a secondary index.
secondary program operator application program (SPO)
A program operator application program that is not authorized to receive unsolicited messages. See also primary program operator application program.
secondary referential constraint
The constraint that occurs when a unique constraint or a primary key constraint is added to file that is a parent file in a defined referential constraint relationship. The referential constraint is regarded as secondary processing because the primary request is for the processing of the unique constraint or the primary key constraint.
The lower priority site for a replicated resource group. See also replicated resource group.
secondary space allocation
The amount of additional space requested by the user for a data set when existing space is full. See also primary space allocation.
A data station that executes data link control functions as instructed by the primary station. A secondary station interprets received commands and generates responses for transmission. See also primary station.
secondary system name
An alternative system name that can be used to identify a system in a SNADS network. See also primary system name.
Any thread that is started by, or on behalf of, the application that is not the initial thread. See also initial thread.
secondary vital-record specification
The second retention and movement policy that DFSMSrmm matches to a data set and volume used for disaster recovery and vital records purposes. See also primary vital-record specification, vital record specification.
- A volume which is paired with a primary volume for the purposes of backup.
- Pertinent to remote copy, the volume in a relationship that contains a copy of data written by the host application to the primary volume. See also relationship.
second backup object
The second backup copy of an object, which is stored in the object-backup storage group that is specified as a second, object-backup, storage group. See also object backup-storage group.
The part of a JES2 destination identifier that indicates a remote workstation, special local-route code, or user ID at the target node to which input is to be sent. See also first-level destination.
second-level interrupt handler (SLIH)
A device-dependent routine that handles the processing of an interrupt from a specific adapter. An SLIH is called by the first-level interrupt handler (FLIH) associated with that interrupt level.
A key that both encrypts and decrypts information. In symmetric cryptography, both communicating parties use a secret key. In asymmetric or public key cryptography, a public key and a private key are used to encrypt and decrypt information.
- The segment of a plan or package that contains the executable structures for a single SQL statement. See also SQL and XQuery compiler.
- A named collection of program object components, called elements. Each section is assigned a name in binder control statements.
- A defined area on a Notes form that can include fields, objects, layout regions, and text. Sections can be set to display (expand) or hide (collapse).
- A block of keys on a keyboard, mostly with some functional relationship (see ISO/IEC 9995-1). For example, function section, numeric section.
- In computer graphics, to construct the bounded or unbounded intersecting plane with respect to one or more displayed objects and then to display the intersection. (T)
- In a VSAM index record, a group of consecutive index entries. The index entries in an index record are divided into approximately as many sections as the square root of the number of entries in order to speed up a search for an entry.
- In COBOL, a set of zero, one, or more paragraphs or entries preceded by a section header. Each section consists of a section header and the related section body.
- A portion of a double-byte code page that consists of 256 consecutive entries. The first byte of a 2-byte code point is the section identifier. A code-page section is also called a code-page ward in some environments.
- A unit of code or data produced by the compiler. Sections do not have attributes. See also segment.
See section number.
- The smallest amount of information that can be written to or read from a disk or diskette during a single read or write operation.
- In disk storage, an addressable subdivision of a track used to record one block of a program or data.
secure attention key (SAK)
A key sequence that ends all processes associated with a terminal to provide a trusted path for secure communication with the TCB. The SAK sequence is Ctrl-x followed by Ctrl-r.
secure auditing facility
A facility of Informix database servers that lets a database system security officer monitor unusual or potentially harmful user activity. Use the onaudit utility to enable auditing of events and to create audit masks. Use the onshowaudit utility to extract audit event data for analysis.
A chat that is encrypted. See also secure meeting.
secure copy program (SCP)
See secure shell/secure copy program.
Secure Electronic Transaction (SET)
An industry standard for secure credit card and debit card payments over open networks such as the Internet. The SET protocol ensures confidentiality of information, integrity of all transmitted data, authentication of the cardholder and the merchant, and interoperability.
Secure Hash Algorithm (SHA)
An encryption method in which data is encrypted in a way that is mathematically impossible to reverse. Different data can possibly produce the same hash value, but there is no way to use the hash value to determine the original data.
Secure Hypertext Transfer Protocol
A security-enhanced variation of HTTP. S-HTTP allows servers and clients to authenticate each other and to define the kind of security used in transmissions. S-HTTP is an alternative to another well-known security protocol, Secure Sockets Layer (SSL). See also secure server.
An online meeting that is encrypted. See also secure chat.
A set of nodes that are controlled by a single administrative party. See also nonsecure network.
secure point of entry (SPOE)
A security feature a trading partner can use to access a remote node using a proxy relationship. Remote users can use SPOE to submit work to the local Sterling Connect:Direct node without explicitly defining user IDs and passwords in processes. See also user proxy definition.
A server that encrypts files that it is sending and decrypts files that it has received to facilitate secure communication with a client. See also Secure Hypertext Transfer Protocol.
Secure Shell (SSH)
A network protocol for secure data exchange between two networked devices. The client can use public-key and private-key authentication, or password authentication, to access the remote server.
Secure Sockets Layer (SSL)
A security protocol that provides communication privacy. With SSL, client/server applications can communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery. See also certificate authority.
Securities Industry Automation Corporation (SIAC)
A subsidiary of the NYSE group and the American Stock Exchange that runs the computer systems and communications networks that power the two exchanges, and disseminate U.S. market data worldwide.
- A financial instrument such as an equity, bond, option, warrant, and so on.
- The protection of data, system operations, and devices from accidental or intentional ruin, damage, or exposure.
- The person who controls access to business data and program functions.
- A programmer who manages, protects, and controls access to sensitive information.
- An individual who is responsible for managing security within a database.
security administrator authority
A special authority that allows a user to add users to the system distribution directory, to create and change user profiles, to add and remove access codes, and to perform office tasks, such as delete documents, folders, and document lists, and change distribution lists for other users.
- An additional hierarchical security marking.
- A non-hierarchical grouping of sensitive information used to control access to data.
A certificate containing information used by the SSL protocol to establish a secure connection. The information can include who a certificate belongs to, who issued it, its unique serial number, its valid dates, and its encrypted 'fingerprint’ that is used to verify the contents of the certificate.
- In RACF, the use of security categories, a security level, or both, to impose access controls. See also security level.
- An installation-defined level of security printed on the separator pages of printed output.
security compliance check
A type of compliance check that is used to check for a variety of security issues. See also software compliance check.
In z/OS, a member containing the definitions for one identification label. These definitions include instructions for the overlay name, and the size and origin of paper to be used.
A collection of related values that can be used to label a user according to their role or security clearance, with the aim of affecting their access to information. See also access level, grant level.
security enabling interface (SEI)
The WebSphere MQ interface to which customer-written or vendor-written programs that check authorization, supply a user identifier, or perform authentication must conform.
A channel exit program that is called immediately after the initial data negotiation has completed on channel startup. Security exits normally work in pairs and can be called on both message channels and MQI channels. The primary purpose of the security exit is to enable the message channel agent (MCA) at each end of a channel to authenticate its partner.
The advanced analytics, expert analysis, and swift remediation of security risks to safeguard the enterprise from dangerous events and attacks without sacrificing innovation and growth.
- In a trusted computing base, a label used to maintain multiple levels of security on a system. This label is a combination of a security class and a security level. See also identification label.
- A classification of users' access to objects or data rows in a multilevel security environment.
- In label-based access control (LBAC), a database object that can be granted to users and can also be applied to columns and rows in a table to protect the data. Only users who are granted appropriate security labels can access data that is protected by a security label. See also label-based access control, security label component, security policy.
- In Resource Access Control Facility (RACF), an installation-defined name that corresponds to a specific RACF security level with a set of security categories.
security label component
In label-based access control, a database object that represents one of the criteria that an organization uses to decide who has access to specific data. See also element, security label.
In RACF, an installation-defined name that is associated with a number in the range 1 through 254. The security level increases as the numbers become higher. See also security classification.
A set of users and user groups matched with permissions or permission groups and optional organization restrictions. It defines who can access an object, action, or feature that contains it, and what they can do once accessed.
The management discipline that addresses the organization's ability to control access to applications and data that are critical to its success. See also availability management, deployment management, operations and administration.
security mechanism (SECMEC)
A technical tool or technique that is used to implement a security service. A mechanism might operate by itself, or in conjunction with others, to provide a particular service. Examples of security mechanisms include access control lists, cryptography, and digital signatures.
One of the messages, sent by security exits that are called at both ends of a channel, to communicate with each other. The format of a security message is not defined and is determined by the user.
A person assigned to control all of the security authorizations provided with the system. A security officer can, for example, remove password or resource security or add, change, or remove security information about any system user.
- In label-based access control, a database object that is associated with one or more tables and that defines how LBAC can be used to protect those tables. The security policy defines what security labels can be used, how the security labels are compared to each other, and whether optional behaviors are used. See also label-based access control, security label.
- A set of security templates that apply default security settings as the user adds objects.
- A set of rules that determine the type of security event an agent detects, the priority of each event, and the way an agent responds to an event.
- A system that performs user authentication. Users and groups can be defined locally (in which case, IBM SPSS Collaboration and Deployment Services itself is the security provider) or derived from a remote directory, such as Windows Active Directory or OpenLDAP.
- See authentication provider.
In Java EE, an abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment. (Sun)
Security Support Provider Interface (SSI)
The means for networked applications to call one of several security support providers (SSPs) to establish authenticated connections and to exchange data securely over those connections. It is available for use on Windows systems.
A set of security settings that can be applied to a document, folder, or custom object. Security templates are components of security policies. See also template.
Testing to determine the security of the software product. (ISTQB) See also functionality testing.
- A token that can be used to represent an authenticated user. Often used when a user task may span multiple processes as in one client accessing multiple server functions.
- A representation of a set of claims that are made by a client that can include a name, password, identity, key, certificate, group, privilege, and so on. See also user token.
- In the Distributed Computing Environment (DCE), an opaque string of bytes, returned to an LU 6.2 from the Generic Security Service (GSS) application programming interface (API), that must be sent to the partner in order for the authentication process to continue. For example, in Kerberos, the contents of an authentication token would be a ticket and an authenticator; in the DCE the contents would be a ticket, an authenticator, an extended Privilege Attribute Certificate (PAC), and a token-granting ticket for delegation. Because the authentication token is opaque, the LU has no knowledge of the token's contents.
- In programming, a string of characters designed as a security device and stored on the computer of authorized users. To log onto the network, the security token may be read directly like a credit card, or it may display a changing number that is typed in as a password.
- In RACF, a collection of security information that represents data to be accessed, a user, or a job. A security token contains a user ID, a group ID, a security label, the node of origin, and other information. See also resource token.
- A web service that is used for issuing and exchanging security tokens.
- A web service that acts as a trusted third party to broker trust relationships between a web service requester and a web service provider according to the WS-Trust protocol.
security trust service chain
A group of module instances that are configured for use together. Each module instance in the chain is called in turn to perform a specific function as part of the overall processing of a request.
See shipper export declaration.
see also entry
A cross-reference from one index entry to additional information. See also see entry.
- A component that starts a connector to initiate a crawl. Seeds are added when a search collection is defined. See also search collection.
- A value that adds randomness to the creation of pseudorandom numbers.
seed list page
In WebSphere Portal, an XML page that contains links to the pages that are available on a portal. Crawlers use the seed list to identify the documents to crawl. The seed list page also contains metadata that is stored with the crawled documents in the enterprise search index.
A cross-reference to a preferred term from obsolete terms, selected synonyms, or terms used by competitive products. See also see also entry.
- A collection of composed text and images, prepared before formatting and included in a document when it is printed. See also page segment.
- A set of customers/buyers within a market who have common wants, needs, characteristics and buying behavior. These wants and needs are sufficiently homogeneous that a consistent set of strategies, marketing campaigns and sales tactics can be directed toward them.
- A contiguous area of virtual storage allocated to a job or system task. The size of a segment varies with the system; in VM, for example, a segment is a 64KB area of storage. In other systems, a segment can vary in size from 4KB to 2 to the 28th power bytes.
- A portion of a profile. The format of each segment is defined by a template.
- See BIU segment.
- In data mining, a group of input data records within a data set that have similar characteristics. Each group is called a segment. Within a segment, each piece of data is evaluated (or scored) for the degree to which it fits the segment to which it belongs. This statistical conformance is represented by a number, called the score, which ranges between 0.0 and 1.0. In DB2 Intelligent Miner, this concept is known as a cluster.
- One or more contiguous elements of a string.
- A unit of code or data produced by the linker and existing only in an executable image of the program. The linker assigns attributes to sections, orders and groups them, and puts them into segments. See also section.
- A collection of related sessions. The sessions returned from a search executed through the portal can be rendered into a segment.
- A section of cable between components or devices. A segment consists of a single patch cable, several patch cables that are connected, or a combination of building cable and patch cables that are connected.
- Any part of an element as defined by two endpoints, two intersections, or one intersection and one endpoint. The intersections must be formed with real elements, not construction.
- The information that can be addressed using a single, unique segment-register value (256MB).
- In a video presentation, any material with a start and stop frame.
- In the Enhanced X-Windows Toolkit, one or more lines that are drawn but not necessarily connected at the endpoints.
- A portion of a message that can be contained in a buffer.
- For TCP/IP, the unit of end-to-end transmission in the TCP. A segment consists of control information and data fields. A segment is transmitted as an IP datagram.
- A group of pages that holds a row of a single table.
- A group of display elements.
- A defined section of a linear asset.
- An EDI logical unit of information. EDI segments are made up of data elements and composites. Segments are delimited; their components are separated by a delimiter.
- A part of a program that can be run without the entire program being in main storage.
- In IMS, the unit of access to a database; for the database system, the smallest amount of data that can be transferred by one IMS operation.
- A strategy that is used for building complex scorecards. This strategy defines segments or subgroups where a scorecard split might be necessary.
- The division of a message that is too large for a queue manager, queue, or application, into a number of smaller physical messages, which are then reassembled by the receiving queue manager or application.
- The process of identifying groups of records with similar values for a target field. The process takes the whole set of records and divides them into subgroups or segments based on characteristics of the records.
- The division of text into distinct lexical units such as words, phrases, sentences, paragraphs, or lemmas.
- A process by which path control (PC) divides basic information units (BIUs) into smaller units, called BIU segments, to accommodate smaller buffer sizes in adjacent nodes. Both segmentation and segment assembly are optional PC features. The support for either or both is indicated in the BIND request and response.
The maximum score of the scorecard when complex reasoning is not used. It is used to tune the contribution factor of a scorecard within the complex scorecard. The segmentation score is a property in a complex scorecard.
segmented table space
A table space that is divided into equal-sized groups of pages called segments. Segments are assigned to tables so that rows of different tables are never stored in the same segment. See also partitioned table space, universal table space.
segment exception condition
In printing, an architecture-provided classification of the errors that can occur in a segment. Segment exception conditions are raised when a segment error is detected. Examples of segment errors are segment format, parameter content, and sequence errors.
segment ID separator
The character that separates the segment identifier from the EDI data elements in the EDI segment. See also data element delimiter.
In OSI, a function performed by an (N)-entity to map one (N)-service-data-unit into multiple (N)-protocol-data-units.(I) Segmenting is the opposite of reassembly. See also fragmentation.
In COBOL, a user-defined word that classifies sections in the Procedure Division for purposes of segmentation. Segment numbers can contain only the characters 0 through 9. A segment-number can be expressed either as a 1- or 2-digit number.
In a database, an instance of a segment type. See also segment type.
In architecture, a segment characteristic used by a drawing process. Examples of segment properties are segment name, segment length, chained, dynamic, highlighted pickable, propagated, and visible.
segment search argument (SSA)
The portion of a DL/I call that identifies a segment or group of segments to be processed. Each SSA contains a segment name and, optionally, one or more command codes, and one or more qualification statements. Multiple SSAs may be required to identify the desired segment. See also qualified segment search argument, unqualified segment search argument.
In a database, a user-defined category of data. See also segment occurrence.
See security enabling interface.
A system function that determines which records from a physical file are to be included in a logical file. See also omit function.
- A process whereby a criterion is evaluated against the data or members of a dimension in order to restrict the set of data retrieved. Examples of selections include the top ten salespersons by revenue, data only from the east region, and all products with margins greater than 20 percent. See also condition.
- A saved set of items or categories (and all items in those categories), or both (which is a static selection) or a saved search query of items (which is a dynamic selection).
A collection of individual items that the user has explicitly selected. The items or members may be selected from one or more levels of the same hierarchy. See also set.
selection data set
In aggregate backup and recovery processing, a sequential data set or a member of a partitioned data set (PDS) used to define the data sets that compose the input. The selection data set contains any include, exclude, accompany, or allocate lists.
A graphic object that is created by IBM ILOG JViews to display a selected object within a manager. These objects are stored in the manager. Unlike regular graphic objects, selection objects are internally managed and cannot be manipulated.
See scheduling priority.
The process of backing up certain files or directories from a client domain. The files that are backed up are those that are not excluded in the include-exclude list. The files must meet the requirement for serialization in the backup copy group of the management class that is assigned to each file. See also incremental backup.
selective cryptographic session
A cryptographic session in which an application program can specify the request units to be enciphered. See also clear session, cryptographic session, required cryptographic session.
The process of copying user-selected files from a local file system to server storage and replacing the files with stub files on the local file system. See also demand migration, threshold migration.
A function of the operating system that allows the user to tailor command prompts at a parameter level. See also conditional prompting.
A function that calculates the percentage of rows that will be returned by a filter function in the WHERE clause of a query. The optimizer uses selectivity information to determine the fastest way to execute an SQL query.
A field in a logical file record format whose value is tested by the system to determine if records including that field are to be used. The test is a comparison with a constant, the contents of another field, a range of values, or a list of values; and the record is either selected or omitted as a result of the test.
- An identifier for a data item. In the WebSphere MQ Administration Interface (MQAI), there are two types of selector: a user selector and a system selector.
- A variable-length string the contains a SQL query.
- In Pascal, the term in a CASE statement that, once evaluated, determines which of the possible branches of the CASE statement are processed.
- An object associated with a project or step that selects the server where the project or step is run. Properties in the selector determine how the server is selected. Selectors can produce static information such as a server name, or dynamic information, such as specifying a server with designated properties.
- The left side of a style rule. A selector consists of a mandatory object type, which is a class in a data model, and optional tags, pseudo-classes, pseudo-elements, and attribute conditions. A selector undergoes pattern-matching to determine the scope of the style rule.
A field, such as an account number, consisting of a base number and a self-check digit. For data entry applications, the operator-entered self-check number is compared with the self-check number calculated by the system.
To adapt to dynamically changing environments. See also autonomic computing.
An message for which no matching definition exists in the message model. For example, a message coded in XML is self-defining. See also predefined message, self-defining element.
- A tool that is used while it is still being developed. Teams can use a self host to improve the quality and usability of a tool before it is made generally available to customers.
- To use a tool while it is being developed before making that tool generally available to customers. Self hosting a tool is a development best practice because it can promote the improvement of product quality and usability.
A certificate that is constructed like a digital certificate, but is signed by its subject. Unlike a digital certificate, a self-signed certificate cannot be used in a trustworthy manner to authenticate a public key to other parties.
self-timed interface (STI)
An interface that has one or more conductors that transmit information serially between two interconnected units without requiring any clock signals to recover the data. The STI performs clock recovery independently on each serial data stream and uses information in the data stream to determine character boundaries and inter-conductor synchronization.
In UML modeling, a relationship that indicates that the active state does not change when an object in the source state receives a specified event, performs a specific action, or meets a certain condition. See also transition relationship.
- The role that supervises the overall store objectives and management, in addition to tracking the store sales. The seller role is equivalent to a merchant.
- An organization that supplies products to enterprises or other buyer organizations.
- A defined role in WebSphere Commerce that has access to all WebSphere Commerce Accelerator capabilities. See also expected inventory, expected inventory record.
- A seller user with administrative privileges.
- The seller administrator manages the information for the selling organization. The seller administrator creates and administers the suborganizations within the selling organization and the various users in the selling organization, including the assignment of appropriate business roles.
A feature that allows the user to define a set of rules for date aging. For example, a set of rules can be defined to adjust aged dates to result in valid business days. See also age, incremental aging, target aging.
The relationships of characters or groups of characters to their meanings, independent of the manner of their interpretation and use. Semantics is the meaning conveyed by a character string. See also parsing, syntax.
A type of keyword search that incorporates linguistic and contextual analysis. See also text analysis.
- A category that defines the real-world meaning of data, and therefore how applications should interpret that data. For example, Person is a semantic type that could be assigned to entity types such as Male, Victim, and Witness. See also entity semantic type, link semantic type, property semantic type.
- The usage or rules for an item. Base, annotation, and note are semantic types supplied by Content Manager; users can also define their own semantic types. See also item.
- An object used by multi-threaded applications for signaling purposes and for controlling access to serially reusable resources. Processes can be locked to a resource with semaphores if the processes follow certain programming conventions.
- A global flag or label in the system that prevents activities from occurring at the same time. Typically projects or steps that require exclusive use of a resource are set up to obtain a semaphore in order to use it.
- An indicator used to control access to a file. For example, in a multiuser application, a semaphore is a flag that prevents simultaneous access to a file.
- In UNIX and Linux systems, a general method of communication between two processes that extends the features of signals.
- An entity used to control access to system resources. Processes can be locked to a resource with semaphores if the processes follow certain programming conventions.
- A mechanism that is used to synchronize one or more jobs.
- A protected variable, used in a UNIX environment, that allows multiple program threads to share the same resource, such as file access, but not simultaneously.
In REXX, a token that indicates the end of a clause and is implied by the REXX interpreter in three cases: by the end of a line, by certain keywords, and by a colon if it follows a single symbol.
See semaphore ID.
send and forget
In extended messaging, an enterprise bean (stateless session bean) that can be built to send asynchronous messages. A sender bean translates its method invocation into a JMS message, then passes that message to JMS. It can also retrieve a response message, translate that message into a result value, and return it to the caller.
A type of channel exit program that is called just before a message channel agent (MCA) issues a communications send to send a unit of data over a communications connection. See also receive exit.
In SNA, the pacing of message units that a component is sending. See also receive pacing.
In Q replication, a WebSphere MQ message queue that is used by a Q Capture program to publish transactions that it has captured. A send queue can be used either for Q replication or event publishing, but not both at the same time.
In SNADS, the values that specify the time that distributions are sent to other locations in a network. The from and to times inclusively specify the range during which distributions can be sent; the force time specifies the time at which distributions are sent regardless of the number of items in the queue.
- In SNA, data sent with a negative response, indicating the reason for the response.
- In printers, sense information used to indicate the causes of command-stream and device exceptions and to direct the host program to the appropriate exception-recovery actions.
- An IMS capability that ensures that only data segments or fields predefined as sensitive are available for use in a particular application. The sensitivity concept also provides a degree of control over data security, inasmuch as users can be prevented from accessing particular segments or fields by omission of those segments or fields from the logical database. Sensitivity is implemented through the database program communication block (DB PCB).
- The amount of time by which a threshold-based health indicator must exceed its threshold or the amount of time that a state-based health indicator must be in a non-normal state before an alert is generated.
- An interface that exposes information about the state and state transitions of a managed resource. A sensor is used to retrieve data from a managed resource, whereas an effector is used to alter data in a managed resource. See also effector, manageability interface, managed resource, sensor value, touchpoint.
- A program that reads information from a managed software system to create configuration information.
- A device that converts measurable elements of a physical process into data that is meaningful to a computer.
- A WiFi monitoring device that captures ping packets that are sent from any mobile device located nearby. The software sends the ping packet information to the IBM Presence Zones server to calculate the coordination of a batch of specific mobile devices. The ping packet includes the message authentication code (MAC ID) of the mobile device and the signal strength between the sensor and the device.
- Software that monitors security networks, applications, or systems for security-related information, possibly indicative of suspicious activity.
In a policy-enabled system, a data value that is returned by a sensor and that can be used by a policy. See also sensor.
- In the vi editor, text that is separated from other text by a. (period), ! (exclamation point), or ? (question mark) followed by two spaces.
- In COBOL, a sequence of one or more statements, the last of which is stopped by a separator period.
separate search space
An implementation of the Product Advisor. For this style of implementation, additional database tables must be created that contain metadata to facilitate searching a particular category of products. See also base search space.
The list of separation characters. See also separation character.
An optional report page that contains information from a recipient's user ID for the purpose of distribution. This particular banner is used to separate individual reports from each other.
- A database object that is independent of any one table that automatically generates unique key values based on initial user specifications.
- In fibre-channel technology, a group of related frames transmitted in the same direction between two node ports (N_ports).
- A list of items in a data set that tend to occur in a predictable order.
- To arrange in order.
- A mechanism for keeping rows unique in cases of multiple iterations of other key data fields.
- A list of recorded URLs.
- A sequentially ordered flat collection.
- In the XQuery and XPath data model, an ordered collection of zero or more items. See also XQuery and XPath data model.
- A decision variable that represents a total order over a set of interval variables.
- The process of verifying the order of a set of records relative to some field's collating sequence.
- In RPG, a function that checks the sequence of records in input, update, or combined files used as primary and secondary files.
A UML structural diagram that shows the chronological sequence of messages between instances (objects or classifier roles) that work together in an interaction or interaction instance. See also communication diagram, lifeline.
Sequenced Packet Exchange protocol (SPX)
A session-oriented network protocol that provides connection-oriented services between two nodes on the network, and is used primarily by client/server applications. It relies on the Internet Packet Exchange (IPX) protocol, provides flow control and error recovery, and guarantees reliability of the physical network.
A connecting object, represented by a solid graphical line, that shows the order of flow objects in a process or choreography. A sequence flow can cross the boundaries between swimlanes of a pool, but cannot cross the boundaries of a pool. There are two types of sequence flows: exception flow and normal flow. See also flow, human service.
- A field in a journal entry that contains a number assigned by the system. This number is initially 1 and is increased until the journal is changed or the sequence number is reset by the user.
- A number assigned to each message exchanged between two nodes. The number is increased by one for each successive message. It starts from zero each time a new session is established.
- In communications, a number assigned to a particular frame or packet to control the transmission flow and receipt of data.
- A numerical value assigned by VTAM to each message exchanged between two nodes. The value (one for messages sent from the application program to the logical unit and another for messages sent from the logical unit to the application program) increases by one for each successive message transmitted unless it is reset by the application program with a set and test sequence numbers (STSN) indicator.
- The number of a record that identifies the record within the source member.
- A 2-byte field in the structured field introducer that identifies the position of the structured field in the data set.
sequence number wrap value
In WebSphere MQ, a method of ensuring that both ends of a communication link reset their current message sequence numbers at the same time. Transmitting messages with a sequence number ensures that the receiving channel can reestablish the message sequence when storing the messages.
The lowest level of the index of a key-sequenced data set (KSDS); it gives the locations of the control intervals in the data set and orders them by the key sequence of the data records they contain. The sequence set and the index set together comprise the index. See also index set.
- The retrieval or storage of a VSAM or SAM data record in either its physical order or its collating sequence relative to the previously retrieved or previously stored record.
- A mode of accessing data on a medium in a manner that requires the storage device to access consecutive storage locations on the medium.
- The process of referring to records one after another in the order in which they appear on the file. See also access mode.
sequential baseline position
In architecture, the current addressable position for a baseline in a presentation space or on a physical medium. See also baseline coordinate.
The allocation of sequential data sets, partitioned data set (PDS) members, partitioned data set extended (PDSE) members, UNIX files, or any combination of these such that the system retrieves them as a single, sequential, data set. See also data set concatenation.
A cursor that can fetch only the next row in sequence and can read through a table only once each time the cursor is opened. See also scroll cursor.
sequential dependent segment (SDEP)
A segment of a data entry database that is chained off the root segment and inserted (last-in first-out) into the last part of a DEDB area. After being inserted by an online program, the SDEP cannot be modified. See also data entry database.
- See sequential data set.
- For Network File System (NFS), a type of MVS file that has its records stored and retrieved according to their physical order within the file. It must be on a direct access volume.
sequential millisecond response
A parameter specified in the definition of a storage management subsystem (SMS) storage class indicating the desired response time to read the next 4-KB block of a data entity assuming the prior 4-KB block has been read.
A rule execution mode for stateless pattern-matching. With this mode, rules can be processed sequentially, which can improve the speed of rule processing in specific cases. The sequential mode can be selected for individual tasks in a rule flow.
In COBOL, the permanent logical file structure in which a record is identified by a predecessor-successor relationship that is established when the record is placed into the file.
A method of processing in which records are read, written to, or deleted in the order determined by the value of the key field. See also consecutive processing, random processing.
A set of several consecutive blocks that are read with a single read I/O operation. Sequential reads are issued by the sequential buffering (SB) component of IMS in order to reduce the elapsed time required to sequentially process large IMS overflow sequential access method (OSAM) databases.
A tendering method that allows a shipper to tender a shipment to a list of carriers one at a time. In sequential tendering, a shipment is made available to the first carrier in the group for a set period of time. If the first carrier fails to respond within the allotted time or declines the tender, the shipment is tendered to the next shipper in the list for the same period of time. The process is repeated until a carrier accepts the tender or the shipment tender time expires.
Pertaining to the sequential or consecutive occurrence of two or more related activities in a single device or channel. See also parallel.
Serial Advanced Technology Attachment (SATA, Serial ATA)
A standard for connecting storage devices such as hard drives and CD ROM drives to computer systems that is based on serial signaling technology.
See Serial Advanced Technology Attachment.
serial-attached SCSI (SAS)
A data-transfer technology that moves data to and from computer storage devices. Serial-attached SCSI uses a point-to-point serial protocol, which replaces the traditional, parallel SCSI bus technology.
See nonscrollable cursor.
- A device that uses serial data as opposed to parallel data.
- A device that performs functions sequentially, such as a serial printer that prints one character at a time.
- The process of controlling access to a resource to protect the integrity of the resource.
- The consecutive ordering of items.
- The process of handling files that are modified during backup or archive processing. See also shared dynamic serialization, shared static serialization, static serialization.
- In object-oriented programming, the writing of data in sequential fashion to a communications medium from program memory.
- In Q replication, the process of applying transactions in the same order in which they were committed at the source.
- To change from parallel-by-byte to serial-by-bit.
- To convert an XML value into a character string or binary string form. This process is the inverse of parsing.
- To convert data from an internal representation to a form that can be exchanged with other programs, using files or a network. When serialized data is deserialized the resulting internal representation is indistinguishable from the original data. See also deserialize.
- In XDR, to convert a particular machine representation to XDR format.
See rotating asset.
See rotating item.
A Java object, one or more of which are produced by the SQLJ translator, that contains SQL statements and descriptions of host variables. A serialized profile file is used to describe the SQL statements so that they can be run with either a JDBC-based or a customized runtime library.
An XML value in the form of a character string or binary string. See also XML data.
A method for converting object data to another form such as binary or XML. See also deserialization.
The reusability attribute with which a program can be used sequentially by multiple tasks. A serially reusable module cannot be entered by a new task until the previous task has exited.
- A unique number that identifies a custom configuration.
- A unique number embedded in the IBM Security Access Manager for Enterprise Single Sign-On keys, which is unique to each key and cannot be changed.
- A unique identifier of each single unit of a SKU attached to the item if serial number tracking is required.
- A connector on a serial device to which cables for other devices are attached.
- An access point through which a computer transmits or receives data, one bit at a time.
See character printer.
Serial Storage Architecture (SSA)
An American National Standards Institute (ANSI) standard, implemented by IBM, for a high-speed serial interface that provides point-to-point connection for peripherals, such as storage arrays. See also Redundant Array of Independent Disks, spatial reuse, SSA adapter.
- In mathematics, the sum of a sequence.
- The consecutive occurrences of a component. In map rules, the [ ] characters denote an indexed member of a series.
A short line stemming from and at an angle to the upper or lower end of the strokes of a character. See also sans serif.
- A software program or a computer that provides services to other software programs or other computers. See also client, host.
- In Enhanced X-Windows, the facility that provides the basic windowing mechanism. It handles interprocess communication connections from clients, de-multiplexes graphics requests onto screens, and multiplexes input back to clients.
- The target of a request from a remote requester. In a DB2 database system, the server function is provided by the distributed data facility, which is used to access a DB2 database from remote applications.
- In Network Computing System, a process that exports one or more interfaces to one or more objects, and whose procedures can be invoked from remote hosts.
- A definition that identifies where an application will be tested or published. See also host.
- In Tivoli Workload Scheduler for z/OS, the optional component that runs on the controlling system and handles requests from remote ISPF dialogs, remote PIF applications, and the Graphical User Interface for Application Description.
- A single appliance, such as an IBM WebSphere DataPower appliance.
- An object that is associated with a host. The server to use is defined by the selector associated with the project or step which is run on the host.
- A component that is responsible for maintaining the data model, managing services, and running policies.
- A queue manager that provides queue services to client applications running on a remote workstation.
server addressing information
In DCE Remote Procedure Call (RPC), an RPC protocol sequence, a network address, and an endpoint that represent one way to access an RPC server over a network. Server addressing information is a part of server binding information.
server-based certificate authority
A certificate authority (CA) that runs under the CA process, a server task. It can be either a Notes or Internet certifier. The CA process can handle any number of Notes and Internet certifiers, and it gives administrators the ability to manage them from the server console, using Tell commands. The CA process also gives Internet certifiers the ability to issue certificate revocation lists (CRLs).
An electronic stamp stored in the server's key ring file that contains a public key, a name, an expiration date, and a digital signature. The server certificate uniquely identifies the server.
In message queuing, a channel that responds to a requester channel, removes messages from a transmission queue, and moves them over a communication link to the requester channel. See also requester channel.
In z/VM Center, a configuration profile for Linux guest systems that includes both Linux and z/VM aspects. A server complex can define network settings, Linux configuration scripts, disk access, and VM Resource Manager (VMRM) performance goals.
A document that is in the Domino Directory or a user's Personal Address Book and that defines a connection to a server. There are four types of server connection documents: dialup, network, passthru, and remote LAN.
server-connection channel type
The type of MQI channel definition associated with the server that runs a queue manager. See also client-connection channel type.
- The characteristics of a specific content server that uniquely identify it to Information Integrator for Content.
- A definition for a computer that hosts a command server, to which systems under development in the Integration Flow Designer can be assigned as the intended execution server.
- In a federated system, the name and information that define the data source to the federated database.
A document that defines many of the settings that control how a Domino server operates. The server document is set up when the administrator or administrators register a server. The server document also enables mail routing
In the Distributed Computing Environment (DCE)Remote Procedure Call (RPC), an entry in the name server database that stores binding information associated with the RPC interfaces of a particular RPC server and object Universal Unique Identifiers (UUIDs) for any objects offered by the server.
The code that resides in system flash memory, and includes a number of subcomponents, including POWER Hypervisor, power control, service processor, and logical partition firmware that is loaded into either AIX or Linux logical partitions.
- A group of Rule Execution Server for z/OS instances that are configured to be transferred to another if a server fails or if there is a planned outage. A server group can include one to 32 server instances.
- A group of items, usually applications, that can be tested as a unit.
- See computer group.
- A single operating system process that runs on a single machine and responds to requests from clients. See also virtual server.
- A logical server that consists of a set of server jobs and configuration objects. Each server instance listens on either a unique IP address or a unique port with the same IP address. A server instance is created, configured, deleted, or controlled from the administration server. The configuration of each server instance is determined by the name of an associated configuration file, instance parameters, and values that are specified on the Configuration and Administration Forms and on the Global Attribute Values page.
An initial program load (IPL) whereby all logical partitions on the server are shut down at the same time. This allows, for example, a new level of the server firmware to be activated on the server.
server-level RAS granularity
The level of RAS granularity at which RAS attribute values are assigned on a server-wide basis. RAS attribute values defined at the server-level are assigned to all requests that the server processes. See also RAS granularity.
The locale that a database server uses when it performs its own read and write operations. The SERVER_LOCALE environment variable can specify a nondefault locale. See also client locale.
A locator that groups a related set of web applications that require authentication by the same authentication service. In AccessStudio, server locators identify the authentication service with which an application screen is associated.
A message that is routed to a server application for processing, or a delivery notification that is routed to a client application to acknowledge the receipt of a client message by its destination.
Server Message Block (SMB)
A protocol that manages requests and responses in a client/server environment so that clients on a network can share files, directories, and devices. See also Common Internet File System, Server Message Block 2.0.
Server Message Block 2.0
A higher performing, more scalable version of Server Message Block (SMB). This protocol can send multiple commands in the same packet and uses larger buffer sizes. See also Common Internet File System, Server Message Block.
server multiplexer group connection (SMX connection)
A multiplexed network connection that provides reliable, secure, high-performance communication between servers in a high-availability environment.
- The unique name of a database server, assigned by the database server administrator, that an application uses to select a database server.
- An identifier that designates an application server. In a federated system, the server name also designates the local name of a data source. See also alias, database name.
A collection of Java or non-Java process definitions that you can define to run on middleware servers. You can create server operations to enable or disable tracing, start or stop applications, query the running state of a server, and so on.
A software-delivery package consisting of products and service for which IBM has performed the System Modification Program/Extended (SMP/E) installation steps and some of the post-SMP/E installation steps.
A process that provides services to client processes. See also client process.
A program that automates an administration task, such as compacting all databases on a server. Administrators can schedule server programs to run at a particular time or can run them as the need arises.
server-prompted scheduling mode
A client/server communication technique where the server contacts the client node when tasks must be done. See also client-polling scheduling mode.
Pertaining to an application or component of an application that runs on a server rather than on the client. JSP and servlets are two examples of technologies that enable server-side programming.
server-side authentication component
server-side include (SSI)
A facility for including dynamic information in documents sent to clients, such as current date, the last modification date of a file, and the size or last modification of other files. See also server-side include injection.
server-side include injection (SSI injection)
An attack technique that exploits a web application's failure to sanitize user-supplied data before it is inserted into an HTML file. This could give an attacker the ability to execute arbitrary operating system commands, or include a restricted file's contents the next time the page is served. See also server-side include.
The primary, copy, and active-data storage pools that are used by the server to store user files such as backup versions, archive copies, and files migrated from hierarchical storage management client nodes (space-managed files). See also active-data pool, copy storage pool, primary storage pool, storage pool volume, volume.
A program provided with the Domino server that runs only when specifically loaded. Server tasks serve various purposes; the Administration Process, HTTP Server, and Reporter are just a few examples of server tasks.
See computer template.
- A component type in the Tivoli Data Warehouse that is created by the IBM Tivoli Business Systems Manager product, displayed in the Executive Console, and provides independent status for associated SLAs based on violation and trend events.
- The outgoing and return route taken by a vehicle, that includes a schedule.
- A component of the system that is an abstraction layer between clients and the database.
- A program that performs a primary function within a server or related software.
- A process that stores data values or a database used by TM1.
- A unit of work that implements activities or interactions between systems or people.
- An offering, function, or activity that performs a task in an organization, and is fulfilled through the use of an organization's intellectual, financial and physical assets.
- In network architecture, a capability of a given layer and the layers below it that is provided to the layer above. The service of a given layer is provided at the boundary between this layer and the next higher layer.
- A TCP/IP port number.
- Work performed by a server. A service can be a simple request for data to be sent or stored (as with file servers, HTTP servers, or email servers), or it can be more complex work (as with print servers or process servers).
- In the Kerberos protocol, a software server that has been assigned a principal name and is registered with the key distribution center (KDC).
- A set of business processes (such as web transactions) that represent business-critical functions that are made available over the internet.
- A resource, such as a web service, to which access requests are made and that can be protected by policies.
- A component that accepts as input a message, and processes the message. For example, a service translates its payload into a different format, or routes it to one of several output queues. Most services are implemented as message flows or primitives.
- A runnable sub-component that the user controls from within the graphical user interface (GUI).
- A networked application that is capable of participating in a RosettaNet conversation.
- An offering that provides skilled assistance to customers. A service may include consulting, education and training, offering enabling services, managed operations, integration and application development. Services are distinguished from products by their intangibility, inseparability, perishability and variability. See also Advanced Integration service, General System service, integration service, product.
A logical unit of software that has an identifier and that is packaged as a unit. Products and bundles are made of one or more serviceable units. A fix can apply to only one serviceable unit.
- In Open Systems Interconnection (OSI) architecture, the point at which the services of a layer are provided by an entity of that layer to an entity of the next higher layer.
- A logical address that allows a system to route data between a remote device and the appropriate communications support.
- In the Ethernet logical link profile, the address for the transaction program on the local system. This address is a hexadecimal value.
- The protocol and credentials associated with a data center device for authentication of remote operations. A data center device can have more than one service access point.
The connection with an IP label between clients and applications. The service address is the address published by the Cluster Information Program (Clinfo) to application programs that want to use cluster services.
Service Advertising Protocol (SAP)
A protocol that allows service providing nodes, such as file server and print server, to advertise their services so that clients can access the services. SAP also provides for responding to a user for a given type of service. This information is delivered through the use of the Internetwork Packet Exchange (IPX) protocol. A SAP packet contains sets of service entry information.
- An agreement between a provider and supplier, or a host and recipient, to define store setup and business relationship terms and conditions.
- See service level agreement.
A category that identifies a group of components that are unavailable for use when one of the components of the group is being serviced. For example, service boundaries are provided on the ESS in each host bay and in each cluster.
service bundle (SVB)
A set of services that logically belong together, for example, because they share resources such as a status table or error processing queue. A service bundle contains the definition files for all resources required to provide the services, for example definition files for message flows, queues, and database tables. A service bundle has a unique name in the scope of an instance. A service bundle must be assigned to an organizational unit and loaded into a server before it is operational.
service bundle set
A group of service bundles that are packaged together to simplify ordering. A definition file that defines the resource classes, resource file types, place holders, and server types that can be used by the service bundles in the set is associated with each service bundle set.
- A list of available provisioning services.
- A repository for units and materials, fixed deliverables, and custom specification items that a company needs frequently.
- For file archive collections, a policy object that is used to specify document retention settings.
- A group of work that has the same service goals or performance objectives, resource requirements, or availability requirements. For workload management, a service goal and, optionally, a resource group is assigned to a service class.
- An entity that acts as a point of resource control and monitoring for a set of database connections and activities within a DB2 database. There are two levels of service classes: service superclass and service subclass. See also service subclass, service superclass, workload definition.
A component that configures a service implementation. A service component consists of an implementation and one or more interfaces, which defines its inputs, outputs, and faults, and also its references, if applicable.
Service Component Architecture (SCA)
An architecture in which all elements of a business transaction, such as access to web services, Enterprise Information System (EIS) service assets, business rules, workflows, databases and so on, are represented in a service-oriented way.
The primary component of the payload of a RosettaNet Business Message, which is an XML document that represents the business content specified by a particular PIP. The Service Content plus any file attachments comprises the payload component of the RosettaNet Business Message.
Part of a General InterORB Protocol (GIOP) message that is identified with an ID and contains data used in specific interactions, such as security actions, character code set conversion, and Object Request Broker (ORB) version information.
Service Data Objects (SDO)
An open standard for enabling applications to handle data from heterogeneous data sources in a uniform way, based on the concept of a disconnected data graph. See also business object.
- A set of data that provides the framework for deploying an IT landscape.
- One or more WSDL files that describe a service. Service definitions are produced by the Definition, Deployment, Adapter, Skeleton, and Proxy wizards.
- An explicit definition of all the workloads and processing capacity in a sysplex. A service definition includes service policies, workloads, service classes, resource groups, and classification rules.
service definition framework
A framework that defines how data is transported between systems, and that converts data into formats that are readable by each system. It defines boundary conditions for accessing services and logs exceptions.
A specialization of a service integration bus destination. Each service destination can directly represent the web service implementation or can indirectly represent the service through a Web Services Description Language (WSDL) document.
- One of the discrete hardware and software products that provide a terminal user with processing ability.
- In OSI, a unit of standardization specifying a complete group of functions.
In Enterprise Service Tools, the generated output of the runtime code generator of the service flow project tools. A service flow is a reusable composed business function that exposes a programmatic interface to a service requester in an enterprise information system.
service flow modeler
In Enterprise Service Tools, the logical concept of a set of tools for building service flows. The service flow project tools in the Enterprise Service Tools perspective are a real-life implementation of the concept of a service flow modeler.
Service Focal Point
An application on the Hardware Management Console (HMC) that collects problems from the system and from logical partitions. It is used to view problems and to take action on problems.
- Specific capabilities within service tools that are typically used for problem determination and problem solving, often with the assistance of IBM support. Examples of service functions include Licensed Internal Code trace, Licensed Internal Code log, and the display, alter, dump function.
- Functions of Tivoli Workload Scheduler for z/OS that allow the user to manage exceptional conditions, such as investigating problems, preparing APAR tapes, and testing during implementation.
service group (SG)
In a Remote Site Recovery (RSR) environment, a collection of all IMSs that access RSR-covered databases at an active or at a remote site, including the recovery control data set (RECON data set). A service group usually includes one or more IMSs at a single site, with the databases and RECON data set shared between the IMSs.
An XML document that identifies the PIP, the business activity, and action with which the business message is associated: the sending and receiving services, partners, and roles. It is packaged together with other headers and the payload to form a complete RosettaNet Business Message.
service integration bus (SIBus)
A managed communication mechanism that supports service integration through synchronous and asynchronous messaging. A bus consists of interconnecting messaging engines that manage bus resources.
service integration bus web services enablement
A software component that enables web services to use IBM service integration technologies. This capability provides a quality of service choice and message distribution options for web services, with mediations that support message rerouting or modification.
service integration logic
Integration logic on an enterprise service bus to mediate between requesters and providers. The logic performs a number of functions such as to transform and augment requests, convert transport protocols, and route requests and replies automatically
service integration technology
Technology that provides a highly-flexible messaging system for a service-oriented architecture (SOA). This supports a wide spectrum of quality of service options, protocols, and messaging patterns. The technology supports both message-oriented and service-oriented applications.
service interface queue
The queue into which applications place messages that are to be processed by a service. In WebSphere BI for FN, each OU that uses a particular service has its own service interface queue, and this queue is implemented as a WebSphere MQ alias queue.
A time interval, against which the elapsed time between a put or a get and a subsequent get is compared by the queue manager in deciding whether the conditions for a service interval event have been met. The service interval for a queue is specified by a queue attribute.
- A service that is defined as an item by a catalog organization.
- An item that can be a fixed deliverable, unit and material, or service level agreement (SLA) item that is procured in Emptoris Services Procurement.
- A class of service that can be used in business policies to aggregate a set of implied service qualities.
- A set of logical characteristics of storage required by a data set managed by a storage management subsystem (SMS). Examples of these logical characteristics are performance, security, and availability.
- One of the four levels of service (fast, status, data high, or data low) that determines if a distribution is put on the normal or priority distribution queue.
Service Level Agreement (SLA)
A contract between a customer and a service provider that specifies the expectations for the level of service with respect to availability, performance, and other measurable objectives.
- In IBM Business Process Management, a rule that a user creates to analyze the performance of business processes over time. An SLA establishes a condition that triggers a consequence and creates a report for one or more activities. Conditions in SLAs are based on a standard or custom key performance indictator (KPI).
- A contract between a customer and a service provider that specifies the expectations for the level of service with respect to availability, performance, and other measurable objectives. See also service level objective.
service level criteria (SLC)
A set of performance objectives that require processing to occur within a certain time period. See also duration schedule, simple SLC, standard SLC, wildcard SLC, workflow SLC.
service level management (SLM)
The disciplined, proactive methodology used to ensure that adequate levels of service are delivered to all IT users in accordance with business priorities and at acceptable cost. IT organizations must thoroughly understand the priority and relative importance of each service it provides. Service level management is the continuous process of measuring, reporting, and improving the quality of service provided by the IT organization to the business.
service level objective (SLO)
A specification of a metric property that is associated with both threshold values for peak and off-peak hours in a schedule and a guaranteed level of service that is defined in a service level agreement (SLA). See also breach value, metric, service level agreement.
service management process
A system automated process that uses a request class and service plan to determine business rules for the creation of a task or project, and assign the task or project to the responsible organization. See also request class.
- See control message.
- A message exchanged between services.
service message object (SMO)
A service data object that can exist only in a mediation flow component. The service message object is composed of a body and headers. The body contains the parameters of the invoked interface operation, and the headers may contain information such as service invocation, transport protocol, mediation exception, JMS properties, or correlation information.
See maintenance mode.
A name that provides a symbolic method of specifying the port number to be used at a remote node. To identify an application, the TCP/IP connection requires the address of the remote node and the port number to be used on the remote node.
- A Blue Gene system which is responsible for management and control of a Blue Gene solution.
- An element of an Intelligent Network that contains the service logic that controls an intelligent network application and resources.
A custom operation that can be run in the context of the data center. These operations are typically administrative operations and are used to automate the configuration. Service operations can also be used to enhance the catalog of available services with extra functionality.
service-oriented architecture (SOA)
A conceptual description of the structure of a software system in terms of its components and the services they provide, without regard for the underlying implementation of these components, services and connections between components. See also web-oriented architecture.
A generalization referring to individuals or companies authorized to service IBM products. The terms service provider, service representative, and service support representative (SSR) refer to types of service personnel. See also service support representative.
A record that works with the request class record to determine the business rules for the service management process. Service plans are used to centralize the rules for managing service requests and work.
- A performance goal that is assigned to a specific application URI to help designate the business importance of different request types.
- A set of performance goals for all z/OS images using z/OS workload management in a sysplex. There can be only one active service policy for a sysplex, and all subsystems in goal mode within that sysplex process towards that policy. However, you can create several service policies, and switch between them to cater for the different needs of different processing periods.
In the OSI reference model, the smallest defined interaction between service users and service providers in adjacent layers. This interaction is a service provided by the lower layer to the higher layer.(I)
- The interface to the Hardware Management Console (HMC) that provides hardware control and logical partition (LPAR) support for IBM Power Systems servers.
- A generic term for Remote Supervisor Adapters, Advanced System Management processors, Advanced System Management PCI adapters, and integrated system management processors (ISMPs). These hardware-based management processors used in IBM Netfinity and xSeries servers work with IBM Director to provide hardware status and alert notification.
- The logic that contains the processor function to start the system processor and handle error conditions.
- See utility program.
- A bound program that performs utility functions that can be called by other bound programs.
- Any company that provides services for a fee to its customers, such as telecommunication companies, application service providers, enterprise IT, and Internet service providers.
- A company or program that provides a business function as a service.
- In the OSI reference model, a layer that provides services to the next higher layer.
- An entity that connects stream data to feed handlers.
- In Enterprise Service Tools, the application that hosts access to a web service. A service provider describes its service using WSDL.
- Any person, organization, or application that provides a service.
- In System Manager, the system used to provide problem-handling support to another system or systems connected to it by communications lines. The service provider can also be the alert focal point in a network. See also service requester.
- In the context of OSLC, a container of resources that is hosted by a tool or product to enable the use of the resources.
- An interface through which vendors can integrate any device with serial numbers with IBM Security Access Manager for Enterprise Single Sign-On and use it as a second factor in AccessAgent.
- An API that supports replaceable components and can be implemented or extended by a third party.
The rate at which an entity can service requests. See also request rate.
- A repository that contains all of the information that is required to access a web service.
- A directory that contains information about services that are available in a network.
A repositories that contains updates for packages, for example IBM support sites or local repositories, which might be linked to other repositories. In managing installation packages, the service repository can be checked for updates to installed products.
service representative basic user profile
A system-supplied user profile, named QSRVBAS, that provides limited authority for a service representative to use dedicated service tools (DST) and system service tools (SST). See also service representative user profile.
service representative user profile
A system-supplied user profile, named QSRV, that provides all the authority required by a service representative to use the dedicated service tools (DST) and system service tools (SST). See also service representative basic user profile.
- An element that is used to manage and track work requests.
- A request from a user for help, information, advice, or access to an IT service.
- A request that is created and passed to the request queue handler whenever a nucleus server requires a service that is not currently available.
- A request created in the Telecom Portal application to order a wireless product.
service request block (SRB)
A control block that represents a routine that performs a particular function or service in a specified address space. See also dispatch.
- In System Manager, the system with a program or equipment problem that requires and asks for problem-handling support from another system in a network. See also service provider.
- In Enterprise Service Tools, an application that is looking for and invoking or initiating an interaction with a web service provider. The requester role can be played by a browser driven by a person or a program without a user interface, for example, another web service. A service requester issues one or more queries to locate a service and determine how to communicate with that service.
- The application that initiates an interaction with a web service. The service requester binds to the service by using the published information and calls the service.
Service Science, Management and Engineering (SSME)
An academic discipline that uses the ideas and skills of computer science, engineering, social science, and business management to improve the productivity, quality, and innovation in services.
The application server, common services, and product services for the InfoSphere Information Server suite and product modules and the computer or computers where those components are installed.
A grouping mechanism for database activities within a service superclass. Resources of a service superclass are shared by all related service subclasses. See also service class, service superclass.
service support representative (SSR)
An individual or a company authorized to service IBM products. See also service personnel.
In the Kerberos protocol, a ticket that grants access to a particular resource, or service. A ticket from a Kerberos authentication server must be presented in order to obtain a service ticket.
The calculation of end time minus start time for a load event or an unload event. The service time for a vehicle is calculated as: Site Arrival Time + Unloading Time + Loading Time + Site Exit Time. See also work time.
service tools device ID
A programming object used by both the PC and the IBM System i model as a means to authenticate the network connection between the two. A service tools device ID is unique to that PC and server connection. The service tools device ID can be managed by authorized users in dedicated service tools (DST) or system service tools (SST). The default service tools device ID is QCONSOLE.
service tools user ID
A user ID that is required to access DST, SST, System i Navigator (for logical partitions and disk unit management), and Operations Console. Service tools user IDs are created through DST or SST and are separate from i5/OS user profiles.
In the context of a service definition, the set of physical IT components (such as hardware and software) that are available for inclusion in services based on that definition. On instantiation, the service topology is the actual set of these components in operation on behalf of the service deployment instance.
service topology node
In the context of a service definition, one element of the service topology to which resources can be allocated based on that definition. On instantiation, the service topology is the actual set of these components in operation on behalf of the service deployment instance.
service transaction program
A program that provides a function internal to SNA Server. See also application transaction program.
- A shipment attribute that specifies how quickly the freight must be delivered.
- A component that contains code that is used to do work when executed in a business process.
A virtualization that compensates for the differences in the syntactic details of the service interactions so that the service requester and provider do not have to use the same interaction protocol and pattern or the same interface, nor do they have to know the identities of the other participants.
See service network.
A Java program that runs on a web server and extends the server functions by generating dynamic content in response to web client requests. Servlets are commonly used to connect databases to the web.
A file that contains the same components as a servlet application. Unlike web archives, servlet archives can have only a sip.xml deployment descriptor and not a web.xml deployment descriptor.
The process of transforming a request or modifying a response without exposing the resource used by the servlet engine. See also filter.
- An automatic device that uses feedback to govern the physical position of a part.
- A feedback control system in which at least one of the signals represents mechanical motion.
See SCSI Enclosure Services.
- A collection of source and target volumes that are managed to create consistent copies of data. The type of data replication that is associated with the session determines the actions that can be conducted for the volumes.
- A single start-to-finish experience of interaction with a website. In Tealeaf, a session is used as the basis for evaluating visitor experience.
- A collection of process groups established for job control purposes.
- A resource that controls local logical units (LUs), remote LUs, modes, and attachments.
- A logical or virtual connection between two stations, software programs, or devices on a network that allows the two elements to communicate and exchange data for the duration of the session. See also administrative session, SQL connection, transaction.
- In Java EE, an object used by a servlet to track user interaction with a web application across multiple HTTP requests.
- A series of requests to a servlet originating from the same user at the same browser.
- In a distributed application, a single conversation between a communicating pair of transactions. See also conversation.
- The time during which an authenticated user is logged on.
session activation request
In SNA, a request that activates a session between two network accessible units (NAUs) and specifies session parameters that control various protocols during session activity.
A method of configuring applications in which a client is always connected to the same server. These configurations disable workload management after an initial connection by forcing a client request to always go to the same server.
session awareness data (SAW data)
Data that is collected by the NetView program about a session that includes the session type, the names of session partners, and information about the session activation status.
An enterprise bean that is created by a client and that typically exists only for the duration of a single client/server session. (Sun) See also entity bean, stateful session bean, stateless session bean.
A session-layer component in an APPN network node or in a subarea node boundary or gateway function that connects two stages of a session. Session connectors swap addresses from one address space to another for session-level intermediate routing, segment session message units as needed, and (except for gateway function session connectors) adaptively pace the session traffic in each direction. See also half-session.
session control (SC)
In SNA, one of the components of transmission control. Session control is used to purge data flowing in a session after an unrecoverable error occurs, to resynchronize the data flow after such an error, and to perform cryptographic verification.
A cookie that stores information in the form of session identification that does not personally identify the user. It is stored in temporary memory and is not retained after the browser is closed.
session cryptography key
In SNA, a data encrypting key that is used to encipher and decipher function management data (FMD) requests transmitted in an LU-LU session that uses cryptography. See also data-encrypting key.
In VTAM, a request to an LU to establish a session. For the primary logical unit (PLU) of the requested session, the session-establishment request is the CINIT sent from the system services control point (SSCP) to the PLU. For the secondary logical unit (SLU) of the requested session, the session-establishment request is the BIND sent from the PLU to the SLU.
A mechanism for separating the business and client tiers of an enterprise application by abstracting the data and business methods so that clients are not tightly coupled with the business logic and not responsible for data integrity. Implemented as session enterprise beans, session facades also decouple lower-level business components from one another.
session functional unit
In OSI, logical groupings of related services provided by the Session Layer, such as activity management, capability data exchange, and negotiated release. Most session functional units are optional. The peer application entities negotiate whether or not the optional functions will be used when the session connection is established.
See session identifier.
- A unique string of data provided by the web server that is used in network communications to identify a session, and is stored within a cookie or URL.
- In WebSphere MQ for z/OS, the identifier, unique to CICS, that defines the communication link to be used by a message channel agent when moving messages from a transmission queue to a link.
Session Initiation Protocol (SIP)
A protocol for initiating interactive multi-media sessions. See also siplet.
- In computer security, a temporary key that grants access to a particular resource or session. A session key is similar to a service ticket in the Kerberos protocol.
- In Cryptographic Support, a data-encrypting key used to encrypt data before it is sent to another location.
- A key that uniquely identifies each CICS-IMS session. The session key is formed from the CICS name for the session and the IMS subpool name.
In Systems Network Architecture (SNA), a session level security protocol that enables two logical units (LUs) to authenticate each other while they are activating a session. Session level authentication is also known as LU-LU verification.
A flow control technique that permits a receiving half-session or session connector to control the data transfer rate (the rate at which it receives request units) on the normal flow. It is used to prevent overloading a receiver with unprocessed requests when the sender can generate requests faster than the receiver can process them. See also adaptive session-level pacing, fixed session-level pacing, virtual route pacing.
- In CDE, a software application that controls saving sessions, restoring sessions, screen locking and unlocking, and the use of screen savers. When a session is saved, the state of the desktop environment (location of icons, size and location of open windows, open/closed status of applications, current color palette, and so on) is preserved so that it can be restored at the next login.
- An application that allows a user at a terminal to log on to multiple applications concurrently.
- An instance of a session data class used to persist web client state between server requests.
- See security token.
In SNA, a parameter that specifies or constrains the protocols (such as bracket protocol and pacing) for a session between two network accessible units (NAUs). See also logon mode.
- For the 3270 Host Connection Program 2.1 and 1.3.3 for AIX, a profile describing the characteristics of a session between a client system and a System/370 host computer.
- In System i Access, a file that describes the characteristics of a PC5250 session.
session qualifier pair
See session key.
In LU6.2 and MRO, the level of security applied when a request to establish a session is received from, or sent to, a remote system. Used to verify that the remote system is really the system it claims to be. See also link security, user security.
session sequence number
A sequentially incremented 10 byte identifier that is assigned to each request unit in an LT session. It is formed by concatenating the 4 byte session number with a 6 byte sequence number.
session services (SS)
One of the types of network services in the control point (CP) and in the logical unit (LU). These services provide facilities for an LU or a network operator to request that a control point (an ENCP, NNCP, or SSCP) assist with initiating or terminating sessions between logical units. Assistance with session termination is needed only by SSCP-dependent LUs. See also configuration service, maintenance service, management services.
An identifier that is sent by the browser as a parameter or a cookie, in order to correlate between a user and their current session on the web application. See also transient token.
A function that collects session trace data for sessions that involve either specified resource types or a specific resource. The session trace data consists of session activation parameters, VTAM path information unit data, and network control program (NCP) data.
Session Traversal Utilities for NAT
A protocol that generates a public address for a client that is hosted behind a network address translator (NAT) or a firewall, enabling the client to receive data from clients outside the NAT or firewall.
In OSI, pertaining to the two versions of the session-layer services and protocols standard. Session version 2 can handle the transmission of larger units of data than session version 1.
- A field/variable whose values represent categories with no intrinsic ranking (for example, the department of the company in which an employee works). Examples of sets include region, zip code, and religious affiliation.
- A collection of unique, unordered elements. No element appears more than once in a set, and by default, there is no reproducible order for the elements of a set.
- A category within a grouping. An example of a set within a grouping, applied to an object type, is East Coast Warehouses, within Region, applied to warehouses. See also grouping.
- A collection of related items or members. Members in a set may be specifically chosen, or selected by one or more filter rules. See also category set, custom set, details-based set, page set, predefined set, selection-based set, stacked set.
- A temporary grouping of objects on a drawing that can be manipulated, changed, stored, or deleted.
- An ordered list of unique elements.
See Secure Electronic Transaction.
An aspect of cache design that determines how many cache lines can be associated with a given memory location. A cache that is four-way set associative can contain a given memory location in one of four cache lines.
set asynchronous balanced mode extended (SABME)
In communications, pertaining to a control command used to initiate data transfer in the extended asynchronous balanced mode of operation with a remote link station. The SABME command uses modulus 128 sequence numbers.
A function that performs calculations on a column in a set of rows in a view, such as the average value of the cost of some similar product orders. A set function may only be used in the selection list of a SELECT statement.
See set-group-ID mode bit.
set integrity pending
A state indicating that integrity processing is required on a table. To remove this state, a SET INTEGRITY statement must be processed for the table. See also check pending, integrity processing.
An operator in SQL that corresponds to a relational operator. A set operator derives a result table by combining two other result tables. An example of a set operator is UNION, which corresponds to the union relational operator.
A method whose purpose is to set the value of an instance or class variable. This capability allows another object to set the value of one of its variables. See also accessor method, getter method.
A view of an object that provides a way to display the attributes associated with the object. For example, using the settings view, the user can change the areas that display in a window, such as the title or columns.
A user-specified time interval during which the application waits before activating an offline resource group on a higher priority node that is joining the cluster. After the settling time expires, the resource group starts activating the node that has the highest priority among the nodes that joined the cluster during the settling time interval. See also delayed fallback timer, resource group, resource group policies, startup.
See set-user-ID mode bit.
- A measure of the relative threat that a source poses on a destination.
- The measurement of how important or significant a message is. The higher the severity level, the more severe or important the condition.
A classification for an event that indicates its degree of severity. The predefined severity levels, in order of descending severity, are: fatal, critical, warning, minor, harmless, and unknown.
See waste water.
See sysplex failure management.
See small-form-factor pluggable transceiver.
See Suomen Standardisoimisliitto.
See Services for UNIX.
See service group.
See Standard Generalized Markup Language.
See smart grid maturity model.
See application shell.
See Secure Hash Algorithm.
- To darken, as if with a shadow.
- In architecture, variation of a color produced by mixing it with black.
See Secure Hash Algorithm digest.
- Highlighting an area on the page by varying graded density.
- In computer graphics, emphasizing a given display group by changing the attributes of all the other display groups in the same display field. (T)
- To duplicate Enterprise Address Book (EAB) data from one system to another and to send EAB changes, additions, and deletions to other systems.
- A duplication of the Enterprise Address Book (EAB) data on another system.
In an RSR environment, a database maintained at the tracking site as a remote copy of a database at the active site. If a remote takeover occurs, the shadow database becomes the master database.
- The process of having a high-level maintenance task, such as a yearly preventive maintenance check supersede a lower-level maintenance task, which eliminates the need for that instance of lower-level scheduling.
- A recovery technique in which current page contents are never overwritten. Instead, new pages are allocated and written while the pages whose values are being replaced are retained as shadow copies to support system restoration. The shadow copies are deleted when they are no longer needed.
- The capability of a system to copy data from one system to another system and keep it up to date whenever it is changed on any system that shadows the information in the network.
A log of errors that occur from the time that an initial program load starts to the time storage management recovery ends. The log contains the latest occurring errors, and may contain errors not found in the error log.
A copy of an existing (primary) Enterprise Replication replicate. Shadow replicates allow Enterprise Replication to manage alter and repair operations on replicated tables. See also master replicate, replicate.
- A table that is used to store historical data. There is one shadow table for each table that is recorded in the synchronization history. See also incremental publication, synchronization history.
- A source table copy that contains some or all of the columns of the source table and is implemented as a refresh-deferred materialized query table that is maintained by replication. See also latency-based routing, replication latency.
A zone where the tags might not be visible temporarily because they are out of reach of the tag reader infrastructure or the signals are shielded. WebSphere Sensor Events assumes that a tag continues to be in the shadow zone at the last reported position after it has been seen. No alert is generated if the tag is no longer visible.
For Arabic script, the process that decides which of the several (up to four) shapes of an Arabic character is to be used in the current context. The shapes are initial, middle, final, and isolated. For each character, the decision is based on the linking capabilities of current and surrounding characters. See also base shape, presentation shape.
A record that describes the resource shape and makes it available through the URI. See also resource shape.
Sharable Content Object Reference Model (SCORM)
A set of standards that, when applied to course content, produces small, reusable learning objects. A result of the Department of Defense's Advance Distributed Learning (ADL) initiative, SCORM-compliant courseware elements can be easily merged with other compliant elements to produce a highly modular repository of training materials.
- A subset of data that is assigned to a server. See also cluster collection store, sharded query, sharding.
- An instance of a partition. A shard can be a primary or replica. See also container server.
- A query that consolidates the results from all servers in a grid or region. See also shard, sharding.
- A query that consolidates the results from one or more shards.
- A file system, file set, or directory that has been made accessible to authorized remote clients by using supported services.
- To direct others to content for them to experience, enjoy, or partake in.
- A folder or file that is made accessible to multiple components or users on a network.
Access to a resource or application using a shared credential. See also credential.
shared access policy
A policy that authorizes role members to share access by credentials or credential pools. A policy can be defined for a specific credential pool, specific credential, all pool or credentials with the same organization container context.
A condition in which the TSO data sets SYS1.UADS (TSO user definition) and SYS1.BRODCAST (TSO message transmission definition) are shared by all systems in the multi-access spool (MAS) complex.
- A memory structure in a cluster caching facility that can be simultaneously accessed by multiple members in a DB2 pureScale instance. The SCA contains database-wide control data that must be synchronized across all members.
- A coupling facility list structure that a DB2 for z/OS data sharing group uses for communication between members of the data sharing group.
A disk that is configured to serve more than one node. Shared disks are physically connected to multiple nodes. See also shared file system.
shared dynamic serialization
A value for serialization that specifies that a file must not be backed up or archived if it is being modified during the operation. The backup-archive client retries the backup or archive operation a number of times; if the file is being modified during each attempt, the backup-archive client will back up or archive the file on its last try. See also dynamic serialization, serialization, shared static serialization, static serialization.
shared dynamic storage area (SDSA)
The user-key storage area for any non-reentrant user-key RMODE(24) programs, and also for any storage obtained by programs issuing EXEC CICS GETMAIN commands for storage below 16 MB with the SHARED option.
A file whose open data path can be shared between two or more programs processing in the same job. See also open data path.
- A file system that is configured to serve more than one node. See also shared disk.
- An operating system extension that allows multiple users or computers to use the same set of files at the same time, across a network. To each user, the shared file system appears to be an extension of the local file system. See also export.
shared-for-read lock state
The lock state for a file in which the file can be shared with another program if the program does not request exclusive use of the file. The predefined value for this lock state is *SHRRD.
shared-for-update lock state
The lock state for a file in which the file can be shared either for update or for read operations with another program. The predefined value for this lock state is *SHRUPD.
shared inbound channel
In WebSphere MQ for z/OS, a channel that was started by a listener using the group port. The channel definition of a shared channel can be stored either on page set zero (private) or in the shared repository (global).
shared IP address
An IP address that is configured so that it can rotate among cluster nodes. See also nonconcurrent resource group.
shared library file
A file that consists of a symbolic name, a Java class path and a native path for loading Java Native Interface (JNI) libraries. Applications that are deployed on the same node as this file can access this information.
- A lock that several tasks can hold.
- A lock that limits concurrently running application processes to read-only operations on database data. See also exclusive lock, gross lock.
shared managed object
A data object that is shared, defined, and managed independently of active work. Instances of shared managed objects exist beyond the end of the process applications that the shared managed objects were created in. See also data object.
A member that explicitly shares storage space with another member of the same name. Shared members prevent making extra calculations on a member that appears in more than one location in the outline.
- Physical memory that is assigned to a shared memory pool and shared among multiple logical partitions.
- An interprocess communications service that provides shared memory segments.
- An area of memory simultaneously accessible to more than one cooperating process.
shared memory segment
An interprocess communications mechanism that allows a process to directly read data from, write data to, and share data with other processes without having the data manipulated by the operating system.
shared-no-update lock state
The lock state for a file in which the file can be shared with another program if the program requests either a shared-no-update lock state or a shared-for-read lock state. The predefined value for this lock state is *SHRNUP.
A library that is not linked to an application at compile time but instead is loaded into memory by the operating system as needed. Several applications can share access to the loaded shared-object file. See also dynamic link library, library, shared library.
shared outbound channel
In WebSphere MQ for z/OS, a channel that moves messages from a shared transmission queue. The channel definition of a shared channel can be stored either on page set zero (private) or in the shared repository (global).
A place created for a community of people with a common purpose. Shared places can be public or restricted. The place creator (who automatically becomes the place manager) specifies whether a place is public or restricted during place creation.
shared processing pool
See shared processor pool.
shared processor pool
A group of physical processors that provide processing capacity that can be shared among multiple logical partitions. Processing capacity from the shared processor pool can be assigned to each of the logical partitions in partial processor increments. The sum of the assigned processing capacity across all logical partitions in the shared processor pool cannot exceed the total processing capacity of the shared processor pool.
- In WebSphere MQ for z/OS, a type of local queue. The messages on the queue are stored in the coupling facility and can be accessed by one or more queue managers in a queue-sharing group. The definition of the queue is stored in the shared repository. See also queue-sharing group.
- A collection of data objects with the same name that reside on a coupling facility queue structure. Data objects on a shared queue are available to all CQS clients that have access to the structure.
- A storage location of server objects where each file is stored only once even if it belongs to several objects.
- In WebSphere MQ for z/OS, a shared DB2 database that is used to hold object definitions that have been defined globally.
- A special resource or workstation resource that can be used simultaneously by more than one operation.
- A function that permits the sharing of a pool of I/O-related control blocks, channel programs, and buffers among several Virtual Storage Access Method (VSAM) data sets that are open at the same time. See also global shared resource, local shared resource.
- A software file or plug-in that is stored in a directory and can be shared by packages. See also installation directory.
shared resources directory
The directory that contains software files or plug-ins that are shared by packages. The contents of this directory are used by all products in all the package groups that are defined on the computer.
A predefined virtual application pattern that is deployed and shared by multiple application deployments in the cloud, including virtual applications, virtual systems, and virtual appliances.
shared static serialization
A copy-group serialization value that specifies that a file must not be modified during a backup or archive operation. The client attempts to retry the operation a number of times. If the file is in use during each attempt, the file is not backed up or archived. See also dynamic serialization, serialization, shared dynamic serialization, static serialization.
- Storage within a storage facility that is configured such that multiple homogenous or divergent hosts can access the storage concurrently. The storage has a uniform appearance to all hosts; the host programs that access the storage must have a common model for the information on a storage device.
- An area of storage that is the same for each virtual address space. Because it is the same space for all users, information stored there can be shared and does not have to be loaded in the user region.
- A storage pool that provides distributed storage access to one or more logical partitions or virtual servers in a cluster or that can be shared by more than one subsystem.
- A storage pool that can be shared by more than one subsystem. See also private storage pool.
shared virtual area (SVA)
In VSE, a high address area of virtual storage that contains a system directory list (SDL) of frequently used phases, resident programs that can be shared between partitions, and an area for system support.
A shared value for sorting purposes. For example, in a simple sort table, the letters a and A might share the same weight value of 24, and b and B the value 25. This would ensure that words such as able and Able would be kept close to each other. See also unique weight, weight.
shared-weight sort sequence
A sort sequence in which some graphic characters in the sequence may have the same weight as some other characters in the sequence. Those with the same weight will sort together as if they were the same character.
A lock that prevents concurrently executing application processes from changing data, but not from reading data. See also exclusive lock.
A collection of agents that scan the same object, such as a table, using the same mechanism, such as a table scan, and potentially share pages or records of this object that are in the buffer pool.
- The page with multiple columns in IBM Docs Spreadsheets.
- In a workbook, a grid-like representation of data that includes predefined logic for analyzing data. See also workbook.
- A division of the physical medium; multiple sheets can exist on a physical medium. For example, a roll of paper might be divided by a printer into rectangular pieces of paper, each representing a sheet. Envelopes are an example of a physical medium that comprises only one sheet. The IPDS architecture defines four types of sheets: cut-sheets, continuous forms, envelopes, and computer output on microfilm. Each type of sheet has a top edge. A sheet has two sides, a front side and a back side. See also form.
A single space on a shelf for storage of removable media. In DFSMSrmm, a shelf location is defined in the removable media library by a rack number; in a storage location, it is defined by a bin number. See also bin number, rack number.
A function that manages the placement of volumes in individual slots in a location. In DFSMSrmm, shelf management is provided for the removable media library using rack numbers. For storage locations, shelf management is optional and uses bin numbers.
shelf-resident optical volume
An optical volume that resides outside of an optical library. See also optical volume.
shelf-resident tape volume
A tape volume that resides outside of a tape library. See also tape volume.
- A compnent that provides custom native capabilities and security features for applications.
- The CICS facility that provides an isolated area for running CICS programs without adversely affecting other users.
- Software that allows a kernel program to run under different operating system environments.
- A software interface between users and an operating system. Shells generally fall into one of two categories: a command line shell, which provides a command line interface to the operating system; and a graphical shell, which provides a graphical user interface (GUI).
See shell script.
In Enhanced X-Windows and AIXwindows, a top-level widget that is internal and communicates directly with the window manager. This widget does not have parents, nor can it be instantiated.
- A scheduled work period. For example, a 24-hour day is often divided into three 8-hour shifts.
- A keyboard action to allow uppercase or other characters to be entered. See also level.
A character encoding for the Japanese language developed by the Japanese company ASCII. It is based on character sets defined within JIS standards JIS X 0201:1997 (for the single-byte characters) and JIS X 0208:1997 (for the double byte characters).
A control character (X'0F') that is used in EBCDIC systems to denote that the subsequent bytes represent single-byte character set (SBCS) characters. See also shift-out character.
shift-out character (SO)
A control character (X'0E') that is used in EBCDIC systems to denote that the subsequent bytes, up to the next shift-in control character, represent double-byte character set (DBCS) characters. See also shift-in character.
- A thin, often tapered, piece of material, such as metal, used to fill in space between things for support, adjustment, or leveling.
- A part for adjusting gaps, play, or position in a mechanism.
A string of consecutive tokens (words) that are taken from a sentence. For example, from "This is a very short sentence.", the 3-word shingles (or trigrams) are: This is a/ is a very/ a very short/ very short sentence/. Shingles can be used in statistical linguistics. For example, if two different texts have a lot of common shingles, the texts are probably related somehow.
- A group of items from one or more customer orders that uses one shipment hub and has the same ship-to address.
- A quantity of product transported from one site to another. See also site.
See shipment identifier.
shipment receipt record
A record that contains information about the receipt of materials at a location, for example, at a site or storeroom within an organization. A shipment receipt record contains details such as the quantity of items that are received, the date of receipt, and the locations of the source and destination storerooms.
A record that contains information about the transfer of materials between source and destination storerooms, such as between two sites within an organization. A shipment record contains details such as the delivery method, the quantity of items, the date of the shipment, and the storeroom locations.
The status of a shipment during the delivery cycle, such as loaded, departed, arrived, or unloaded. See also plan status.
A condition of a shipment that is bound to a quote. The terms can specify the period within which the payment is to be made by the customer or the carrier service that will be used to fulfill the products in the quote.
ship order total pricing rule
A pricing rule that changes the total shipping charges charged to a customer based on the order total. For example, an organization can create a pricing rule under which a customer can avail a 100% discount on shipping charges if the customer buys goods worth $5000 or more.
The manufacturer, retailer, or other organization that manages contracts, shipments, and freight payments. The shipper organization can also work with vendors and suppliers that might not be licensed to use Sterling TMS.
A company that provides shipping services from a fulfillment center to a customer. See also fulfillment center.
The packaging units, such as a pallets or cartons, that are specified in a shipment manifest. A shipment can contain one or more shipping units. Each shipping unit can contain one or more items.
See simple HISAM.
See short-hold mode.
See shared memory ID.
shopping flow URL
A controller command that has a URL interface and is run from a store interface. See also redirection URL.
The language that is used when displaying pages to a particular customer. See also preferred language.
The act of either manually or automatically resolving inventory shortages that are detected. Inventory shortages can be resolved by placing an order for the additional quantity, or by canceling some of the orders placed at a later date for the item that has the inventory shortage.
The evaluation of Boolean expressions with AND and OR such that the right operand is not evaluated if the result of the operation can be determined by evaluating the left operand. The evaluation of the expression is always from left to right.
See keyboard shortcut.
A brief description of a term in a business glossary. See also long description.
The processing path that takes the shortest time to complete of all parallel paths in a process instance, where each path considered begins at a start node or an input to the process and ends at a terminate node.
Shortest Path First (SPF)
A routing algorithm in which each router uses the length of the path to determine the shortest-path spanning tree. Shortest Path First is used by link-state routing protocols. See also link-state routing protocol.
See coded character set identifier.
short-hold mode (SHM)
A mode specified during configuration that allows the DTE to connect or reconnect when no data is being transmitted over a circuit-switched line, while maintaining the logical connection of the sessions across the circuit.
In query management, the set of language-specific interfaces that allow commands to run that do not require access to program variables. The short interface includes the communications area, command length, and command string.
Short Message Service (SMS)
A message service that is used to send alphanumeric messages that are 160 characters or less between mobile phones. See also Multimedia Messaging Service.
Short Message Service Center (SMSC)
A component of the mobile telephony network, specified by the GSM group of standards, that provides for exchange of alphanumeric messages of less than 160 bytes. Messages can be exchanged between different types of system such as mobile telephone, alphanumeric pager, terminal, email, telex, or DTMF telephone.
The condition in CICS that occurs when requests for storage from the dynamic storage areas exceed available storage. CICS cannot satisfy these requests, or can satisfy them only by using some of the storage cushion, even when all programs that are eligible for deletion, and are not in use, have been deleted. See also program compression, storage cushion.
A transformer program for function shipping over MRO links. It is designed to optimize the pathlength involved in the construction of the TIOAs send on an MRO session for function shipping.
short wavelength (SWL)
A type of fiber optic cabling that is based on 850-mm lasers and supports 1.0625-Gbps link speeds. SWL can also refer to the type of gigabit interface converter (GBIC) or small form-factor pluggable (SFP). See also long wavelength.
A card that presents information to respondents. For example, a show card can format a category list in a larger font so that interviewers can show the card to respondents instead of reading out loud the list of categories.
A feature that can determine if the supplier is favorable or not favorable for business. When a question or questionnaire is designated as a show-stopper, the suppliers must attain the minimum score required for it. If a supplier does not achieve the required score, buyers may not consider them favorable for business.
- The process of breaking up an XML document for storage in database tables.
- See decomposition.
A method of wrapping and sealing materials by surrounding them with plastic and then shrinking the plastic by applying heat. This method is used for protection during transportation or storage, as well as a safety sealant.
See simple hierarchical sequential access method.
The status of a unit of recovery that has failed at one of the following points: while in doubt during a two-phase commit process; while attempting to commit changes to resources at the end of the unit of recovery; or while attempting to back out the unit of recovery. If a unit of recovery fails for one of these reasons, it is removed (shunted) from the primary system log to the secondary system log pending recovery from the failure.
Pertaining to the status of a UOW that has failed at one of the following points: while in-doubt during a two-phase commit process, while attempting to commit changes to resources at the end of the UOW, while attempting to back out the UOW, or if a UOW fails for one of these reasons, it is removed (shunted) from the primary system log (DFHLOG) to the secondary system log (DFHSHUNT) pending recovery from the failure.
The process of suspending a unit of work in order to allow time to resolve the problem that has caused the suspension. Shunting releases the user's terminal, virtual storage, and CP resources, and allows completion of the unit of work to be deferred for as long as necessary.
- A status condition that describes when the cluster is shut down as intended.
- The process of ending operation of a system or a subsystem by following a defined procedure.
See soft hyphen.
See session information block.
- Children of the same parent window.
- In a database outline, any member that is at the same branch level as another member. For example, Quarter 1, Quarter 2, and Quarter 3 are siblings.
Two or more occurrences of different sibling segment types having a common parent segment occurrence. See also twin segments.
See service integration bus.
In Performance Toolbox, a value that is incremented continuously. Instruments show the delta (change) in the value between observations, divided by the elapsed time, representing a rate per second.
- See SCCS identification.
- See security identifier.
- See subject identifier.
- See shipment identifier.
- See source ID.
- In architecture, a physical surface of a sheet. A sheet has a front side and a back side.
- The part of a sector address that indicates which surface of a double-sided diskette is to be accessed by the read/write head.
- See physical partition.
- An undesirable result caused by altering the values of nonlocal variables by a procedure or function.
- A change in the state of the execution environment.
A storage area used to maintain copies of tracks within a concurrent copy domain. A concurrent copy operation maintains one sidefile in storage control cache and another in processor storage.
- System-defined variables that are used for the initial values of the communications element of the SAA Common Programming Interface partner_LU_name, mode_name, and TP_name characteristics.
- In OSI, system-defined values that are used as the initial values of certain parameters. In OSI Communications Subsystem, side information is a combination of (a) information in the OSI Communications Subsystem information base, and (b) information provided by directory service.
See signaling information field.
The copying of a value from a higher-level resource to a lower-level resource. The sift-down effect applies to many of the keywords and operands in NCP and VTAM definition statements.
See silicon-germanium technology.
- A symbol that is used when placing an image in a presentation.
- To attach a unique electronic signature, derived from the sender's user ID, to a document or field when a document is mailed. Signing mail ensures that if an unauthorized user creates a new copy of a user's ID, the unauthorized user cannot forge signatures with it. In addition, the signature verifies that no one has tampered with the data while the message was in transit.
- A mechanism by which a process can be notified of, or affected by, an event occurring in the system. Examples of such events include hardware exceptions and specific actions by processes.
- In replication, an SQL statement that allows communication with the Capture program and the Q Capture program. A signal is inserted into the signal control table and received by the Capture program or the Q Capture program when the program reads the log entry for the signal insert.
- In UML modeling, model elements that specify one-way, asynchronous communications between active objects and that are independent of the classifiers that handle them.
- A condition that might or might not be reported during program execution. For example, a signal can represent erroneous arithmetic operations, such as division by zero.
- In operating system operations, a method of inter-process communication that simulates software interrupts.
signal catching function
See signal handler.
Signal Computing bus (SCbus)
A time division multiplexed (TDM) hardware bus originated by Dialogic to interconnect different vendors' computer telephony adapters. Specified as part of Signal Computing System Architecture (SCSA).
Signal Computing System Architecture (SCSA)
An architecture defined by Dialogic to support interoperability of software and hardware components developed by different vendors in the computer telephony industry.
In OSI, an error detected but not recovered by the network layer. The error is signaled to the transport layer for action. For example, the network connection is lost and reset to a known state, possibly with loss of data, but the connection remains available for use. See also residual error.
- In WebSphere MQ for z/OS and WebSphere MQ for Windows, a feature that allows the operating system to notify a program when an expected message arrives on a queue.
- The exchange of control information between functional parts of the system in a telecommunications network.
signaling link code (SLC)
A code that identifies a particular signaling link connecting the destination and originating signaling points. This is used in MTP signaling network management messages to indicate the signaling link to which the message relates.
signaling NaN (sNaN)
In decimal floating-point operations, a value, not interpreted as a mathematical value, that contains a mask and a sequence of floating-point digits and that causes an invalid operation condition if used in certain arithmetic operations. See also decimal floating-point number.
A DirectTalk component that controls signaling for an exchange data link or common-channel signaling protocol. Some signaling processes are supplied with DirectTalk, and others can be custom-written.
A signal, such as resource reservation setup protocol (RSVP), that carries an admission control request to a network. The signal requests bandwidth resource according to an application's request. To get quality of service from a network, systems need to use signaling protocols.
- The collection of types associated with a method. The signature includes the type of the return value, if any, as well as the number, order, and type of each of the method's arguments.
- A value that identifies the interfaces supported by a service program. Signatures are based on the exports and the sequence of the exports allowed from a service program.
- The set of unique information that identifies a software application, such as the name, version, and file size of an application. See also signature candidate.
- A code in a policy that determines what an agent can detect.
- In profiling, unique identification information for any application, window, or field.
In DCE Security, pertaining to information that is appended to an enciphered summary of the information. This information is used to ensure the integrity of the data, the authenticity of the originator, and the unambiguous relationship between the originator and the data.
- The trusted certificate entry that is typically in a truststore file.
- The digital certificate that validates the issuer of a certificate. For a CA, the signer certificate is the root CA certificate. For a user who creates a self-signed certificate for testing purposes, the signer certificate is the user's personal certificate. See also truststore.
The program interruption that occurs when the resulting fraction in a floating-point addition or subtraction instruction is zero. This program interruption can be disabled through a program mask-bit setting.
- In binary floating-point format, the part of a number that contains the whole number and fraction.
- The significant digits of a floating-point number.
State data that keeps a resource from being deleted in Resource Manager (RM) when the resource is no longer active on any IMS. See also state data.
- Any number of a series of numbers that follows the farthest left number, that is not a zero, and that is within the accuracy allowed.
- A number or series of numbers to the right of a decimal point.
A resource status classified as significant. In addition to being recoverable, if the resource status is specified as significant, the resource cannot be deleted after a terminal logoff, a user signoff, or an IMS restart.
The act a terminal user performs in order to end an identification of a user to IMS. When the terminal is an ETO terminal, the signoff process usually disconnects the user structure from the terminal structure and deletes the user structure.
- The procedure by which the user starts working at a workstation.
- A request made by an application process or terminal user to verify authorization to use resources.
sign-on table (SNT)
A table holding terminal operator data, including the operator name, password, and operator priority. Each entry in the table contains data used by CICS to verify an operator name and to establish a priority and operator class for transactions entered by the operator.
A piece of text that is stored and displayed with an item or a placeholder. The signpost message explains how to obtain more control over, or more information about, the item. See also cloaked item, placeholder.
An installation that does not send messages to the console but instead stores messages and errors in log files. A silent installation can use response files for data input. See also response file, unattended installation.
A method for installing or uninstalling a product component from the command line with no GUI display. When using silent mode, you specify the data required by the installation or uninstallation program directly on the command line or in a file (called an option file or response file).
silicon-germanium technology (SiGe)
A technology that makes possible the design of complex chips that integrate the functions of a cellular telephone, an emailbox and an Internet browser into a hand-held information device with rapid data transfer capability.
See Subscriber Identity Module card.
See single-instruction, multiple-data.
See single inline memory module.
Simple API for XML (SAX)
An event-driven, serial-access protocol for accessing XML documents, used. A Java-only API, SAX is used by most servlets and network programs to transmit and receive XML documents. See also Document Object Model.
An attribute in a business object that contains only one value. Valid attribute types for simple attributes include String and Integer. See also array attribute, attribute, single-cardinality attribute.
In COBOL, one of the conditions chosen from the following set of conditions: relational condition, class condition, condition-name condition, switch-status condition, sign condition. See also complex condition.
See basic disk.
- In Enterprise Service Tools, a field in a message that is based on a simple type. A simple element can repeat, and it can define a default or a fixed value.
- An item in the source or target document that does not contain child items, only data. For example: EDI data elements, ROD fields, XML attributes, and XML PCData values. See also complex element, element.
simple identity relationship
An identity relationship that relates two business objects through a single-attribute key. Each business object that participates in the simple identity relationship contains a key with a single unique value that identifies it.
An image composed of a single raster pattern. See also complex image.
A lowercase letter. See also capital letter.
A list of like values; for example, a list of user names. See also mixed list.
simple name server
A switch service that stores names, addresses, and attributes for up to 15 minutes, and provides them as required to other devices in the fabric. SNS is defined by Fibre Channel standards and exists at a well-known address. See also Fibre Channel service.
Simple Network Management Protocol (SNMP)
A set of protocols for monitoring systems and devices in complex networks. Information about managed devices is defined and stored in a Management Information Base (MIB). See also Management Information Base, SNMP agent, SNMP data source adapter, SNMP manager, SNMP trap.
An SLC that is created by specifying values for basic parameters and giving the SLC a name and a description. When a simple SLC is created, all of the necessary supporting objects are also created. See also service level criteria, standard SLC, wildcard SLC, workflow SLC.
simple text language (STL)
A language that uses the single-byte character set. Simple text languages have the following characteristics: (a) the total number of alphabetic and other characters needed by these languages are small and are containable in single-byte encodings; (b) the languages are written unidirectionally left to right and top to bottom; (c) each character is assigned a single code position and does not utilize any combining sequence representation; (d) the languages are non-ideographic, that is, they use words consisting of one or more characters from their alphabets. See also complex text language, ideographic language.
- A characteristic of a simple element that defines the type of data in a message (for example, string, integer, or float). In XML, a simple type cannot have element content and cannot carry attributes. See also complex type.
- In the XML, a type that cannot have element content and cannot carry attributes. Elements that contain numbers (and strings, and dates, and so on) but do not contain any sub-elements are said to have simple types.
- Pertaining to communication that carries a signal in one direction only. Radio transmission is an example of simplex communication.
- Pertaining to printing on only one side of the paper. See also tumble.
An algorithm for solving linear programming problems by testing adjacent vertices of the feasible set in a sequence such that at each new vertex the objective function is either unchanged or improved.
The state of a volume that is not part of a dual-copy or a remote-copy volume pair. Ending a volume pair returns the two devices to the simplex state, in which there is no longer any capability for either automatic updates of the secondary device or for logging changes.
- The Chinese character set that has been simplified by reducing the number of strokes in common characters and deleting complicated variants. Simplified Chinese characters are used primarily in the People's Republic of China.
- Characters defined and used in the People's Republic of China and Singapore. Simplified Chinese characters are derived from Traditional Chinese characters in one of two ways: 1. Remove or simplify the strokes of the Traditional Chinese character; 2. Replace the Traditional Chinese character by another (simpler) Traditional Chinese character. See also Traditional Chinese.
Simplified Chinese double-byte character set
An IBM-defined double-byte character set for Simplified Chinese. It consists of Simplified Chinese non-Chinese set, primary set, secondary set, and up to 1,880 user-definable characters.
Simplified Chinese non-Chinese character set
A subset of the Simplified Chinese DBCS, consisting of non-Chinese characters, such as Latin alphabet, Greek, Russian, Roman numeric, alphanumeric and related symbols, Katakana, Hiragana, Japanese, special symbols, and Chinese phonetic symbols. There are 712 characters in this set.
Simplified Policy Language
A human-readable syntax for the Autonomic Computing Policy Language and policy templates. See also Autonomic Computing Policy Language.
A mathematical technique that is assisted by a temperature scheme to find a good approximation of the optimum with respect to a certain goal. In graph layout, simulated annealing is used to place labels in such a way that they do not overlap with one another or with nodes and links.
A faster-than-real-time performance of a process. Simulation enables organizations to observe how a process will perform in response to variations of inputs to the process, just as in a real-life work environment.
A copy of a process model and the elements on which it depends, augmented with simulation attributes, that you use to run a simulation. Each simulation profile in a snapshot is based on the process as it existed at the time that the snapshot was taken.
A record of the complete process model in a state that you want to preserve for simulation purposes. This record contains a copy of all the project elements the process uses, as well as any additional project elements.
An environment for staging code that is written for a different platform. Simulators are used to develop and test code in the same IDE, but then deploy that code to its specific platform. For example, one can develop code for a BlackBerry device on a computer, then test it using a simulator on that computer.
simultaneous multithreading (SMT)
A processor design that combines hardware multithreading with superscalar processor technology. Using SMT, a single physical processor emulates multiple processors by enabling multiple threads to issue instructions simultaneously during each cycle.
simultaneous peripheral operation online
In a data-sharing environment, a coupling facility structure that contains only one VSO DEDB area. See also multiple-area structure.
A setting allowing an action to be carried out by a single person. See also dual authorization.
single buffer mode
In GL, a mode in which the frame buffer bitplanes are organized into a single large frame buffer. This frame buffer is the one currently displayed and is also the one in which all drawing occurs.
A character that uses one byte of storage. Because a single byte can store values in the range of 0 to 255, it can uniquely identify 256 characters. With these code sets, an application can assume that one character is always stored in one byte. See also 8-bit character, multibyte character.
single-byte character set (SBCS)
A coded character set in which each character is represented by a 1-byte code. A 1-byte code point allows representation of up to 256 characters. See also double-byte character set, multibyte character set.
Single-Byte Command Code Sets Connection (SBCON)
The standard, approved by the American National Standards Institute (ANSI), for the command set used by ESCON and FICON, known as FC-SB as used over a standard fibre-channel physical interface.
See single-byte coded font.
An attribute that represents a single value, which may be either a simple attribute or a single child business object. When this attribute represents a child business object, its type is the same as that of the business object it represents. See also array attribute, attribute, child business object, simple attribute.
single-cluster control data set
In DFSMShsm, a migration control data set (MCDS) or backup control data set (BCDS) that is represented by a single, Virtual Storage Access Method (VSAM), key-sequenced data set (KSDS) cluster. The cluster can be a key-range cluster or a cluster not employing a key range.
A reusable deployment environment architecture for IBM Business Process Management products and solutions in which the functional components of the environment (messaging, support, web-based components, and application deployment) are on one cluster.
Single Digital Trunk Processor
The combination of a single digital signal processing card and supporting equipment that provides high-level voice compression, high voice quality, and digital telephone signaling functions (transmit and receive) using an external shielded cable to an attached IBM RS/6000 computer. The Single Digital Trunk Processor supports one T1 or E1 trunk. See also Multiple Digital Trunk Processor.
Fonts with a single entry in the Map Coded Font structured field. This includes all single-byte fonts and those double-byte fonts being defined as coded fonts. See also multiple-entry font.
single inline memory module (SIMM)
In computer hardware, a small circuit card that carries a number of surface-mounted memory chips in a space-saving configuration with the connector pins protruding in a single line from the edge of the card. Varying numbers of SIMMs can be plugged easily into slots in a memory board to expand random access memory. See also dual inline memory module.
single instance queue manager
A queue manager that does not have multiple instances. See also multi-instance queue manager.
single lock manager
A concept where locks for database resources shared between programs or subsystems are handled by one control point. Either an IRLM or a Program Isolation locking function can be invoked for the subsystem.
A method of recording WebSphere MQ for z/OS activity where each change is recorded on one data set only. See also dual logging.
single message mode
A processing mode in which synchronization points occur as each message is read from the queue, as well as at application termination. See also message mode, multiple message mode.
single-mode optical fiber
An optical fiber in which only the lowest-order bound mode (which can consist of a pair of orthogonally polarized fields) can propagate at the wavelength of interest. See also multimode optical fiber.
An environment that supports one MVS image. See also MVS image.
A cluster whose configuration is preserved when an application is installed and other nodes are added. Single-node clusters are used when an operating system has configured dependencies between applications running on a single node and application monitors for the applications.
A method in which a program can commit updates to a commitment resource without coordinating those updates with updates the program has made to resources controlled by another resource manager.
single point of control (SPOC)
In a sysplex, a method for managing multiple subsystems as if they were one system. For example, instead of entering commands on each subsystem, a user can enter commands from one SPOC and the commands will run on each subsystem in the sysplex.
- An environment in which one failure can result in simultaneous loss of both the coupling facility (CF) list structure for a log stream and the local storage-buffer copy.
- A configuration in which a critical cluster function is provided by a single component. If that component fails, the cluster has no alternative way to provide that function and essential services become unavailable.
single port sharing
An arrangement for short-hold mode operation in which each port is shared by a set of DTEs, with the restriction that all reconnection calls (recalls) must use the same port as the first call for that logical connection.
- The specification that causes the floating-point value to be stored internally in the short format. See also double precision.
- The use of one computer word to represent a number, in accordance with the required precision.
single-precision floating-point number
A 32-bit approximate representation of a real number. See also floating-point number.
single response variable
A categorical variable that can have only one value for each case, such as a variable based on a question that requires the respondent to choose one answer from a predefined set of answers.
single root I/O virtualization (SR-IOV)
A Peripheral Component Interconnect (PCI) Special Interest Group specification to allow multiple partitions that are running simultaneously within a single computer to share a Peripheral PCI Express (PCIe) device.
A classification model used in conjunction with the DB2 access control module, or RACF external security module, to construct DB2 classes with the subsystem ID as part of the class name. See also multiple-subsystem scope.
- The collection and presentation of data about multiple CICS systems as though they were a single CICS system. In CICSPlex SM, the single-system image is provided by the CICSPlex SM address space (CMAS).
- A cluster of DirectTalk systems that are connected together using a local area network. Each system (known as a node) in the cluster is configured as either a client or a server.
A sysplex in which only one system can be initialized as part of the sysplex. In a single-system sysplex, cross-system coupling facility (XCF) provides XCF services on the system, but does not provide signaling services between MVS systems.
In CICS, a test of a single application or transaction running by itself. See also multithread test.
singleton implicit transaction
A single-statement transaction that does not require either a BEGIN WORK or a COMMIT WORK statement. This type of transaction can occur only in a database that is not ANSI compliant, but that supports transaction logging. See also explicit transaction, implicit transaction.
See Session Initiation Protocol.
An advanced form of Voice over IP calling that supports conferencing (multiple people can speak) and multicast sessions (one person speaks, many listen) in addition to traditional two-party phone calls.
A Session Initiation Protocol (SIP) servlet that performs SIP signaling to back-end applications of the SIP server, such as the presence server or instant messaging server. See also Session Initiation Protocol.
See Standiseringskommissionen I Sverige.
See system initialization table.
- A subdivision of an organization that can track inventory and other data separately from other sites.
- The set of components that monitor and control agents.
- A work location, such as a plant or facility. See also organization.
- A representation of a geographical location where resources are well connected through a fast, reliable LAN. Object stores, storage areas, content cache areas, index areas, and virtual servers are all associated with an individual site.
- A location containing a node or nodes with access to either the production copy or mirror copy. The sites can be in close proximity or geographically dispersed.
- A location in a network that holds Active Directory servers. A site is defined as one or more well-connected TCP/IP subnets.
- A physical location that the IBM Presence Zones system is interested in. For example, in retail, each physically separated store is a site.
- The place at which a customer, a plant, a warehouse, or a hub is located. See also hub, shipment.
The association of a location with each storage system in a session. Site awareness ensures that a volume can only be selected for a session if it matches the location of the site. Site awareness helps to prevent both reversing a hardware relationship and selecting volumes at the wrong location.
- A certificate obtained for an individual site. A site certificate is different from a trusted root certificate in that a site certificate lets you access only a specific site. A trusted root certificate lets you access any servers with certificates issued from that trusted root certificate authority.
- A certificate that is associated with an off-platform server or other network entity, such as a peer VPN server.
A configuration setting that determines the FileNet P8 client appearance, behavior, and connectivity. Administrators can set site preferences for their site. Non-administrative users can set personal preferences, which override some site preferences.
site primary node
In cross-site mirroring, a node that owns the independent disk pool, either the production copy or mirror copy, at a particular site. The production-site primary node is also the primary node for the cluster resource group. The mirror-site primary node is a backup node in a cluster resource group.
A search that a customer performs on your online store using the search features that your store offers. For example, the customer searches using the search box in the store header for something specifically in your store.
- See event rule.
- A significant occurrence that is detected when a set of conditions are met. For example, exceeding the limits of a Key Performance Indicator (KPI).
- Any significant change in the state of a system resource, as represented in a Common Base Event. An event can be generated for a situation, such as a problem, the resolution of a problem, or the successful completion of a task. See also Common Base Event.
- A set of conditions that, when met, creates an event. See also attribute group, condition, event.
See smallest installable unit.
An approach to business which requires a very high level of quality with only 3.4 defects, failures, or errors per million measurable units of product and service. See also Green Sigma.
A bean created from an existing WSDL document that contains a set of methods that corresponds to the operations described in the document. When the bean is created, each method has a trivial implementation that can be replaced by editing the bean.
- The time difference between two clocks or clock values.
- In the Netezza environment, a condition that occurs when data for a user table is not evenly distributed across the data slices of the system. The skew results in a performance impact for queries against that table.
- The position of being slanted or tilted; oblique.
- In printers, the position of paper going through the paper path at a slight angle. Skew causes the printed lines to not be aligned properly.
- To ignore one or more instructions in a sequence of instructions.
- To pass over one or more positions on a data medium; for example, to perform one or more line feed operations. (A)
- A move of the current print position to another location.
Pertaining to a configurable data entry feature that enables the system to automatically insert a defined data value into fields that the system skips based on previous responses and implemented logic.
A line-printer control in line data that allows space to be left between print lines. This control is compatible with page printers when the data is formatted by page definitions.
See stock keeping unit.
See standard label.
A variable that is introduced into the standard formulation of a problem so that a constraint can be expressed as a strict equality instead of a “less than or equal to” OR “greater than or equal to” inequality.
See service level definition.
See system log data set.
See session-level encryption.
- A single iteration of a grid or loop. See also loop.
- Those parts of a waveform lying inside two given amplitude limits on the same side of the zero axis. In FD:OCA, a subarray that consists of all elements that have an identical position within any given dimension of a regular n-dimensional array.
- A subset of a multidimensional array that corresponds to a single value for one or more members of the dimensions not in the subset. For example, if the member Actuals is selected from the Scenario dimension, then the sub-cube of all the remaining dimensions is the slice that is specified.
- A view of a cube saved as a standard spreadsheet that retains a bi-directional link to the cube so that changes made in either the cube or in the slice are available in both locations.
- The set of blocks that contains pages with data having a certain value of one of the clustering dimensions.
A mathematical technique for processing a sparse matrix. It consists of creating pairs of values that identify cells of interest, as opposed to empty cells. The pairs of values can be used to set up processing loops. In OPL, the process of defining constraints with nested iterations on filtering conditions.
- To move a slider interface item horizontally on a touchscreen. Typically, apps use slide gestures to lock and unlock phones, or toggle options. See also gesture.
- Hardware attached to a device that moves the device in and out of the rack in a drawer-like action. See also rail.
- A control that uses a track and arm to set a value from among the available values. The position of the arm (or a separate indicator) gives the currently set value.
- An interface element that moves from one end of a track to the other.
See second-level interrupt handler.
See thin client.
See Serial Line Internet Protocol.
See service level management.
See service level objective.
- A section of a JSP set aside for displaying personalized data or content.
- A space in a library where a cartridge is stored. See also cell.
- For a fixed-length relative record data set (RRDS), the data area addressed by a relative record number that may contain a record or be empty.
- A long electrical socket inside the system unit into which an electronic circuit board (card) is installed.
- A sub-location within a maintenance location. For example, a railway depot or an aircraft hangar may be sub-divided into slots so that maintenance tasks can be allocated.
See service slot spanning.
See Service Location Protocol.
See signaling link selection.
See secondary logical unit.
An LU0 protocol defined by IMS as a protocol to communicate between a programmable workstation, such as a 4700, and IMS. IMS is the Primary Logical Unit (PLU) and the workstation is the Secondary Logical Unit (SLU) in the connection.
See statement local variable.
See systems management application entity.
Small Computer System Interface (SCSI)
An ANSI-standard electronic interface that allows personal computers to communicate with peripheral hardware, such as disk drives, tape drives, CD-ROM drives, printers, and scanners faster and more flexibly than previous interfaces. See also fixed-block device, Internet Small Computer System Interface, open system, SCSI device, target.
small-data-set packing (SDSP)
In DFSMShsm, the process used to migrate data sets that contain actual data that is equal to or less than a specified amount. The data sets are written as one or more records into a Virtual Storage Access Method (VSAM) data set on a migration-level-1 volume.
small-data-set-packing data set
In DFSMShsm, a Virtual Storage Access Method (VSAM) key-sequenced data set (KSDS) allocated on a migration-level-1 volume and containing small data sets that have been migrated.
smallest installable unit (SIU)
The file or set of files that comprise the atomic (non-aggregated) installable unit (IU) that is intended to be deployed into a single hosting environment. The SIU delivers the capability of the IU and its descriptor. An SIU can be added and aggregated with other IUs into a container installable unit (CIU) or into a solution module. See also container installable unit, hosting environment, solution module.
In the vi editor, a contiguous set of alphanumeric characters bounded on at least one end with a character that is not a blank, a tab, or a new-line indicator. For example, in the word isn't, the two sets of characters isn and t are small words.
See system-managed access-path protection.
smart card middleware
Software that acts as an interface between smart card applications and the smart card hardware. Typically the software consists of libraries that implement PKCS#11 and CAPI interfaces to smart cards.
A mobile telephone or tablet that functions more like a computer and less like a traditional telephone. Smartphones typically can function as an Internet browser, MP3 player, gaming platform, digital camera, email client, GPS, and more. See also smartphone, tablet.
An interconnected, enriched campus that provides on-the-ground knowledge that is being developed by social networks. A smarter campus provides a personalized and collaborative learning experience for students, and instant access to deep computing resources for researchers.
In the Smarter Planet initiative, exploration that integrates and processes geophysical and other relevant data to develop 3-D models of reservoirs. Smarter exploration can find previously inaccessible oil and gas reserves embedded beneath difficult terrain or the deepest ocean waters.
smarter food system
In the Smarter Planet initiative, a food system that has standards for quality, process, and accountability. Through these standards food can become safer, more affordable, sustainable, and efficient. See also track and trace service.
An IBM initiative to build instrumented, interconnected, and intelligent systems. Smarter Planet takes advantage of the increasing quality and amount of data and advanced analytics to understand complex systems and some of the most challenging problems within them.
smarter power grid
In the Smarter Planet initiative, a power grid that uses broadband data streams, digital sensors, and advanced analytics. Utilities can analyze demand in real time, source, and manage power more effectively, and give more control of usage to customers.
In the Smarter Planet initiative, a product that uses embedded systems so that a user can personalize and customize a product. Even after purchase, a smarter product has the capacity for continual and dynamic upgrading.
smarter reservoir management
In the Smarter Planet initiative, a reservoir management system that makes use of sensors embedded across pipes, pumps, and an entire field. Smarter reservoir management generates data that can be compared against historical trends and applied to optimize well performance.
In the Smarter Planet initiative, a traffic system, such as streets, bridges, intersections, signs, signals, and tolls, that is instrumented and interconnected. Smarter traffic aims to curb the increasing pressure urban development puts on commuting by reducing inefficiency and congestion in the system.
- A view on a rule project that allows the user to display project elements grouped by property.
- A folder in which to organize artifacts to access them easily. A smart folder might contain artifacts that share properties or a smart folder might contain all the artifacts that were modified within a specific period.
smart grid maturity model (SGMM)
A power grid that has reduced outages, improved responsiveness and efficiency, and is better equipped for future demand compared to traditional power grids. Smart grids are achieved through process improvement, increased automation, and better analysis.
smart large object
A large object that is stored in an sbspace, which has read, write, and seek properties (similar to a UNIX file), is recoverable, obeys transaction isolation modes, and can be retrieved in segments by an application. Smart large objects include BLOB and CLOB data types.
A device that measures the consumption of electricity, gas, or water to ensure reliable billing, to meet regulatory requirements, and to enable smart grid initiatives that support the intelligent utility network for a Smarter Planet.
A mobile phone that functions more like a computer and less like a traditional telephone. Smartphones typically can function as an Internet browser, MP3 player, gaming platform, digital camera, email client, GPS, and more. See also smart device.
A section within a record that can reference fields in one or multiple other records. A smart section contains a set of fields for each record that it references, and each field in a smart section corresponds to a field in a referenced record. Each smart section in a record is based on an association between the record that contains the smart section and another record. For example, you can associate an Organization record to a triPeople record.
smart wind farm
A wind farm that is equipped with sensors to collect data and monitor the health of a farm and operations. Sensors are placed on wind turbines to track wind levels and turbine output, and meteorological sensors around the farm measure wind speed and direction, temperature, pressure, and humidity at hub height, along the vertical blade extent and near the ground.
See system management BIOS.
See solution module descriptor.
See system-managed directory entry.
See Simplified Message Desk Interface.
See System Management Facilities.
SMF product section
Component of a CICS monitoring or statistics SMF record. The SMF product section describes the CICS data section that follows it in the record and contains operational data pertaining to the processing of the data.
A collection of information about capacity and system management that is written to a Systems Management Facility (SMF) data set. Each SMF record includes information about the system's configuration, paging activity, and workload. See also RACF SMF data unload utility.
See Storage Management Initiative Specification.
See System Management Interface Tool.
See service message object.
- See symmetrical multiprocessing.
- See symmetric multiprocessor.
- See symmetric multiprocessing.
- See symmetrical multiprocessor system.
See SMP/E for z/OS.
Pertaining to a program's ability to avoid any action that would cause functional or performance problems in an SMP environment. A program that is described as SMP-efficient is generally assumed to be SMP-safe as well. An SMP-efficient program has usually undergone additional changes to minimize incipient bottlenecks.
SMP Expansion Module
An IBM xSeries hardware option. It is a single module that contains microprocessors, disk cache, random access memory, and three SMP Expansion Port connections. Two SMP Expansion Modules can fit in a chassis.
See symmetrical multiprocessor system.
- See system management services.
- See storage management system.
- See Short Message Service.
- See storage management subsystem.
- See Software Management Services.
See Short Message Service Center.
A list of attributes that the storage management subsystem (SMS) applies to data sets having similar allocation (data class), performance (storage class), or backup and retention (management class) requirements.
SMS complex (SMSplex)
A group of one or more systems that share a common storage management subsystem (SMS) configuration. All systems in an SMSplex share a common set of SMS control data sets: the active control data set (ACDS) and the communications data set (COMMDS).
The entity that DFSMS uses to manage storage: a base configuration; definitions of storage management subsystem (SMS) classes, group, library, and drive definitions; and automatic class selection (ACS). See also active configuration, base configuration, source control data set.
See Short Message Service gateway.
See Simplified Message Service Interface.
See SMS complex.
SMS table space
See system-managed space table space.
The name of the VSAM server that provides VSAM record-level sharing (RLS). See also VSAM record-level sharing.
See Simple Mail Transfer Protocol.
See Simple Mail Transfer Protocol gateway.
A denial-of-service attack in which a spoofed source address is flooded with echo replies. The replies are caused when many ping (ICMP echo) requests using the spoofed source address are sent to one or more broadcast or multicast addresses.
See server multiplexer group connection.
See serial number.
See Systems Network Architecture.
SNA 3270 API
See SNA 3270 program interface.
In PSF, pertaining to a device that is linked to the host system through VTAM or ACF/VTAM and uses an SNA protocol to transfer data. See also TCP/IP-attached.
SNA distribution services
See Systems Network Architecture distribution services.
A user-configured (using the ADDCMNE command) batch job that is started in the subsystem specified on the communications entry when the system receives SNADS distribution from a sending system in the SNADS network. See also SNADS sender.
A user-configured (by using the CFGDSTSRV command to add the SNADS distribution queue) batch job that is started in the QSNADS subsystem, and sends distributions to another system in the SNADS network. See also SNADS receiver.
See Systems Network Architecture File Services.
See Systems Network Architecture File Services.
See SNA Network Link.
SNA/Management Services Transport
See Systems Network Architecture Management Services Transport.
See Systems Network Architecture Management Services Transport.
See signaling NaN.
The part of the user application network that conforms to the formats and protocols of Systems Network Architecture (SNA). The SNA network consists of network addressable units (NAUs), a gateway function, intermediate session routing function components, and the transport network.
SNA network interconnection (SNI)
The connection, by gateways, of two or more independent SNA networks to allow communication between logical units in those networks. The individual SNA networks retain their independence.
SNA Network Link (SNALINK)
A function that allows the use of an SNA subarea routing network to transfer data using TCP/IP protocols. SNALINK provides an interface between TCP/IP and the SNA network. SNALINK must be defined as an application program to VTAM, which causes LU 0 sessions to be established between the SNALINK logical unit and other logical units in the SNA network.
See Systems Network Architecture/network job entry.
See subnetwork access protocol.
The i5/OS software processes through which SNA data is passed from source secondary applications or devices to target primary applications. SNA pass-through supports LU session types 0 through 3.
A registered user exit program that is defined to be called from mail server framework user exit points. The mail server framework user exit points are referred to as ports by the mail server framework. Systems will snap-in the programs that are needed to operate.
snap-in provided information (SPIN)
An area where snap-in user exit points programs can store information that other snap-ins can use. SPIN provides a place where information relating to a specific recipient can be stored and used by snap-ins in the same user exit point or in different user exit points. The information that is stored in snap-in provided information is completely user defined and interpreted data.
- An image backup type that consists of a point-in-time view of a volume. See also image snapshot.
- In Tivoli NetView, a copy of a map that reflects the topology and status of the map's nodes and links at a given moment in time.
- A stored version of a chart that preserves its contents and layout at a particular stage of its development.
- A record of backup data at a certain point in time.
- An image that is an exact copy of the original files or directories from which it was created.
- A statistical sample.
- A copy of changed data in the active files and directories of a file system with the exception of the inode number, which is changed to allow application programs to distinguish between the snapshot and the active files and directories.
- In source control management, a collection of baselines that represents the configuration of a workspace or stream at a particular point in time.
- The content of a report or report object captured at a specific moment in time.
- A point-in-time copy of an entire active file system.
- A captured state, data, and hardware configuration of a running virtual machine.
- See baseline.
- A record of the current state of the database environment.
- A capture of data at a point time for performance analysis.
- A capture of information at a specific time for analysis. The information can be data, a project, or a branch.
- A collection of information about resources and the state of a virtual data center at a point in time.
See snap dump.
The result of taking snapshots of a consistency group. See also consistency group.
- A view that is a replica of a view at the time a query was executed.
- A view that uses a local file system to access versions of elements.
SNA remote job entry
See remote job entry.
SNASVCMG mode name
See SNA service manager mode name.
See SNA topology manager.
SNA topology manager (SNATM)
A component of NetView for MVS that dynamically collects status and topology data into the Resource Object Data Manager (RODM) for display by the NetView Graphic Monitor Facility (NGMF). SNATM includes the function formerly provided by the NetView APPN Topology and Accounting Manager (APPNTAM).
SNA upline facility (SNUF)
The communications support that allows a System i system to communicate with CICS/VS and IMS/VS application programs on a host system. For example, DHCF communicates with HCF and DSNX communicates with the NetView Distribution Manager program.
See switched network backup.
See SNA network interconnection.
See Storage Networking Industry Association.
See physical sensor.
The practice of monitoring or eavesdropping on electronic transmissions. Information that is sent across the Internet might pass through many routers before it reaches its destination. Any of those routers can sniff the transmission and attempt to interpret the information. Passwords or other confidential information that is sent in an unencrypted form might be discovered.
- A unit of database work that is to be performed by the SPU.
- An excerpt of source code.
See SWIFTNet Link.
See Simple Network Management Protocol.
SNMP Access and Trap Forwarding
An IBM Director Agent feature that enables SNMP to access managed-system data. When installed on a managed system, this feature enables SNMP-based managers to poll the managed system and receive its alerts. If System Health Monitoring is installed on the managed system also, hardware alerts can be forwarded as SNMP traps.
- A device that reports information through the SNMP to SNMP managers. See also Simple Network Management Protocol.
- A server process that resides on a network node and is responsible for communicating with managers regarding that node. The node is represented as a managed object, which has various fields or variables that are defined in the appropriate MIB.
SNMP data source adapter (SNMP DSA)
A data source adapter that allows management information stored by SNMP agents to be set and retrieved. It also allows SNMP traps and notifications to be sent to SNMP managers. See also Simple Network Management Protocol.
See SNMP data source adapter.
- A managing system that runs a managing application or suite of applications. These applications depend on Management Information Base (MIB) objects for information that resides on the managed system. The SNMP manager generates requests for this MIB information, and an SNMP agent on the managed system responds to these requests.
- A host that collects information from SNMP agents through the SNMP. See also Simple Network Management Protocol.
An SNMP message sent from the SNMP agent to the SNMP manager. The message is initiated by the SNMP agent and is not a response to a message sent from the SNMP manager. See also Simple Network Management Protocol.
See secondary node.
A schema that represents a dimension in a series of tables that correspond to the levels of the dimensions. The primary key of each table is the member identifier of each level. Each table has a foreign key to the level above. See also metadata schema.
See set normal response mode.
See sign-on table.
See sign-on table terminal entry.
See SNA upline facility.
See Schweizerische Normen-Vereinigung.
See shift-out character.
See service-oriented architecture.
A lightweight, XML-based protocol for exchanging information in a decentralized, distributed environment. SOAP can be used to query and return information and invoke services across the Internet. See also web service.
The message domain that includes all messages that conform to the SOAP standard. To process a message, a message model for messages is created in this domain. See also BLOB domain, DataObject domain, IDoc domain, JMS domain, MIME domain, MRM domain, XML domain, XMLNS domain, XMLNSC domain.
Rules for serializing data over the SOAP protocol. SOAP encoding is based on a simple type system that is a generalization of the common features found in type systems in programming languages, databases, and semi-structured data.
An element in the SOAP envelope of a SOAP message that contains application-specific context information (for example, security information) that is associated with the SOAP request or response message.
A program that interprets a message that belongs to the SOAP domain, and generates the corresponding tree from the bit stream on input, or the bit stream from the tree on output. The bit stream is a representation of an XML file.
See start-of-authority record.
See sphere of control.
See Serial Optical Channel Converter.
The process of building social networking bridges from online storefronts to external social networking sites by leveraging portable, online identities with WebSphere Commerce powered websites. See also social commerce.
A business that uses social media to communicate with customers and staff in real time without geographic restrictions. With social media, businesses can disseminate and collect large amount of data about products and customer and employee satisfaction.
In enterprise social business, the interaction of work peers to solve common problems across the organization. Enterprise social software facilitates knowledge sharing between peers and engenders social collaboration.
The process of adding social networking capabilities to the framework of a store in order to integrate user-generated content into the storefront. Although social networking content can be viewed by any customer, it can only be created by registered customers. See also social bridging.
Online collaboration services that facilitate communication, file sharing, and networking. See also social network.
social messaging bridge
A program or application that connects different aspects of a company's collaboration portfolio together. For example, IBM Notes and Domino 9.0 Social Edition complete the social messaging bridge to IBM Connections.
An online community where people with similar interests, needs, and goals can interact, make connections, and collaborate. See also follower, hashtag, social media, tweet, tweet, tweeter.
social network analysis
A method of analyzing the structure of social relationships that uses mathematical metrics to make claims about social organization and social dynamics. See also centrality, weight.
Society of Automotive Engineers (SAE)
A non-profit educational and scientific organization dedicated to advancing mobility technology to better serve humanity. The SAE is composed of over 90,000 engineers and scientists that develop technical information about all forms of self-propelled vehicles including automobiles, trucks and buses, off-highway equipment, aircraft, aerospace vehicles, marine, rail, and transit systems.
- An identifier that an application uses to uniquely identify an end point of communication. The user associates a protocol address with the socket by associating a socket address with the socket.
- In the Network Computing System (NCS), a port on a specific host; a communications end point that is accessible through a protocol family's addressing mechanism. A socket is identified by a socket address.
- A communications handle used by TCP/IP.
- A means for directing data to an application in a TCP/IP network using a unique identifier that is a combination of an IP address and a port number.
A data structure that uniquely identifies a specific communications end point. It also specifies the protocol family. For example, a TCP/IP socket address consists of a port number and a host address.
See socket application programming interface.
socket application programming interface (socket API)
An industry standard API that provides application programs with a connection-oriented or a connectionless transfer of data over multiple protocols.
- A mechanism by which a secure proxy data channel can be established between two computers.
- A client/server architecture that transports TCP/IP traffic through a secure gateway. A SOCKS server performs many of the same services that a proxy server does.
See SOCKS server.
See Sockets Secure.
A proxy server that provides a secure one-way connection through a firewall to server applications in a nonsecure network. The server applications in the secure network must be compatible with the socket interface.
See Scale out File Service.
A form of commitment control that differs from traditional commitment control in that it limits the number of times that the system writes journal entries that are associated with a transaction to disk. Soft commit improves transaction performance and guarantees transaction atomicity, but does not guarantee the durability of recently committed transactions in case of a system failure.
soft CPU shares
An attribute that defines the relative share of CPU resources on a host or LPAR that the WLM dispatcher allows a particular service class to use and exceed when additional CPU resources are available.
soft error page
A type of web page that provides information about why the requested web page cannot be returned. For example, instead of returning a simple status code, the HTTP server can return a page that explains the status code in detail.
soft hyphen (SHY)
A special character inserted automatically or by the user in a word to mark where the word can be divided, and displayed as a hyphen when the word must be divided at the end of the line because of lack of space. Also called syllable hyphen, discretionary hyphen, phantom hyphen. Soft hyphens are subject to hyphen drop, which makes sure that these characters do not appear when they are not needed.
A process whereby access to a dependent object is allowed to continue after an object on which it depends was dropped or modified by a DDL statement. The next explicit reference to the dependent object that requires the dynamic SQL cache to be accessed causes the dependent object to be recompiled.
- A resource that is not declared in the Map Page Segment structured field but is sent to the printer inline with data.
- A page segment sent to the printer as part of the overlay or page that includes it. See also hard page segment.
A request for items or tools that is not yet defined by the need for the items within a specific time frame. A soft reservation does not reduce the available balance. When a reservation is classified as soft, the item is available for eventual issue from the list of reservations. See also hard reservation.
A resource that is not declared in a Map structured field but is sent to the printer inline with data. It cannot be reused during the job without being reloaded to the printer. See also hard resource.
- A policy according to which, if the end user starts the product and there are no licenses available, the product starts.
- A function that halts the system after all the business processes finish running.
The programs, procedures, rules, and associated documentation pertaining to the operation of a system. See also hardware.
- All software defined in the data center model.
- A portable representation of the contents of the software knowledge base that serves IT management applications including asset management, license management, and software provisioning. Catalog format and content might vary, depending on the target application. See also software knowledge base.
software compliance check
A compliance check that determines if a software application should be present on a computer. See also security compliance check.
The deployment configuration that describes how to install one or more installable software dependencies. It includes a list of installable files, software prerequisites, and advanced attributes. See also installable file.
The combination of software product, version, release, and variation that represents a software item in the software knowledge base. The product is the root of the hierarchy. See also parent software, release, software item, software knowledge base, variation, version.
- The set of files that is created by an installable file.
- The process of restoring software from external media to a local file system. The software can require further processing, or configuration, before it is ready to use.
- For z/OS platform software, the SMP/E target and distribution zones that are associated with a product set and the target and distribution libraries described by those zones. See also product set.
- An activation of an application system or environment.
A table mapping a raw keystroke to a display symbol, predefined function or string. Software keyboards that are shipped with the operating system are associated with languages (U.S. English, U.K. English, Danish, Japanese, and so on).
software knowledge base
A collection of information about distributed software products and components, dependencies between them, the means to discover them, and their basic licensing properties. The knowledge base is used to generate software catalogs that asset management tools can use for software inventory identification, license compliance, and software provisioning. See also parent software, software catalog, software hierarchy.
software license key
An authorization that regulates the use of software licensed programs. Software license keys need to be installed on the system when software is upgraded or moved, the hardware processor group is changed, additional license usage is added, or new software that requires license keys is purchased.
See software development lifecycle.
Software Management Services (SMS)
A set of offerings that provide the user with a consistent distribution, installation, and service strategy for both IBM licensed programs and System Manager-packaged programs.
- In software distribution, a compressed text file that describes the actions to perform on the target system to which it is distributed. See also stanza.
- A file that defines a collection of artifacts and the actions to take with those artifacts on the target system to which it is distributed.
software package block (SPB)
A file or set of files that can be included in a particular software deployment. Examples include an installation package, installation files for a patch downloaded from the vendor's website, or a software image.
software package definition (SPD)
A compressed text file that describes the actions to perform on the target system to which it is distributed. See also stanza.
A software item that is licensed independently of other software items. For licensing purposes, software products are sometimes bundled into a single sales offering. See also unconfirmed instance.
A distribution of a new product or new function and authorized program analysis report (APAR) fixes for an existing product. The first version of a product is announced as release 1 modification level 0.
Installed software, software configurations, and application data that is created when a piece of software is installed. Software resources are defined by a software configuration template.
An automated process that discovers instances of software installed on the computers in a network. The software scan results include details about discovered software, such as version numbers. See also network scan, scan.
A differential image of software installed on top of a running operating system. Software snapshot creation is deprecated. Any previously created software snapshots can be deployed for backward compatibility.
A group of software applications licensed as a single unit; for example, an office software suite might include a spreadsheet application, a word processing application, and a photo editor.
software support facility (SSF)
An IBM online database that allows for storage and retrieval of information about all current authorized program analysis reports (APARs) and program temporary fixes (PTFs).
A way to organize software in the data center based on specific criteria. There are two types of software views. Public views are available to all users. Personal views are specific to the user account of the person who created them.
See start-of-header character.
Pertaining to the act of requesting information from an autonomic manager. See also unsolicited.
- A data storage device that uses solid-state memory to store persistent data.
- See flash drive.
- In constraint programming, an assignment of values to variables that satisfies all the constraints of the problem, including any objective function. See also feasible.
- A set of one or more related case types, tasks, steps, and other components that provide documents, data, business processing, and routing to case workers. For example, a solution for a human resources department might include a case type for new hires, a case type for retirement, and a case type for employee termination.
- A predefined response to a commonly asked question or problem containing symptom, cause, and resolution information.
- In operations research, an assignment of values to variables that satisfies the constraints of the problem. If, in addition to satisfying the constraints, the assignment of values to variables also optimizes an objective function, then the solution is an optimal solution.
- A combination of products that addresses a particular customer problem or project.
Solution Installation for Autonomic Computing
The core technology of the IBM Autonomic Computing initiative that provides a single, consistent installation technology that provides standard methods for determining dependencies, deploying and configuring components into a complex system, and analyzing the system for failed components.
A managed resource that represents a collection of other managed resources, which can be managed as a single unit. An example of a solution instance is a composite application that includes a set of J2EE applications, queues, and message flows.
The installable unit (IU) that aggregates smallest installable units (SIUs), container installable units (CIUs), and other solution modules for multiple hosting environments. The solution module also contains a descriptor for the SIUs, CIUs, and solution modules. See also installable unit, smallest installable unit.
solution module descriptor (SMD)
See installable unit deployment descriptor.
A subset of the search space of a problem. It consists of only those tuples (of the Cartesian product of the domains of the variables) that satisfy the constraints. See also search space.
A queue of solve processes that are solved in the order in which they were submitted. Users can check on the progress of the current solve process or cancel it using menu options and toolbar buttons.
A specialized optimization engine for analyzing a model and providing feasible or optimal solutions for a problem that is expressed as an objective function. Examples of the optimization criteria are least cost, greatest profit.
See System Object Model.
See standard operating procedure.
A search that allows a client to receive search results sorted based on a list of criteria, where each criteria represents a sort key. This moves the responsibility of sorting from the client application to the server, where it might be done more efficiently.
- The process of establishing a specific order for the information in a RequisitePro view. See also filtering, query.
- A procedure for placing items in order. Sorting can be done at various levels of sophistication. The simplest sorting uses the code points, whereas the sorting done for dictionaries must consider cultural and language values. See also cultural sort.
sort-merge file description entry
In COBOL, an entry in the File Section of the Data Division that is composed of the level indicator SD, followed by a file name, and then followed by a set of file clauses as required.
The order in which characters are arranged within the computer to sort, combine, or compare data. A binary sort uses the internal representation of a character to sort characters in a sequence. When you use binary representation to sort characters, your resulting data may not be in the order that you expect.
- A port that places voice data on the SCBus.
- A specified instance of an application that provides a service to the WebSphere Front Office environment. Each source is uniquely identified by its source name in the configuration file.
- In advanced program-to-program communications, the system or program that starts jobs on another system.
- A system, a program within a system, or a device that makes a request to a target.
- In distributed data management (DDM), the platform that originates a request for remote data. See also Distributed FileManager, target.
- In VisualAge RPG, a part that can notify target parts whenever the state of the source part changes. A source part can have multiple targets.
- The markup-language pertaining to files that define a HATS project or one of its resources. Also the name of a folder contained in each HATS project.
- The IP address of a computer that sends a network packet.
- The location from which information is to be sent. See also destination address.
An application whose data is collected from its operational data stores and placed into the central data warehouse using an extract, transform, and load (ETL) process. See also consumer application.
source call view
A display of the nodes in the Application Diagram which represent blocks of code within the source that can be called, such as RPG subroutines, RPG subprocedures, COBOL procedures, and main entry points. The connections represent calls between the blocks of code.
source catalog entry
A product or SKU that contains one or more merchandising associations. When a source catalog entry is displayed, the user can view the defined merchandising associations. See also target catalog entry.
A computer program in a format that is readable by people. Source code is converted into binary code that can be used by a computer. See also object code.
source code control
A utility that allows the user to share catalogs between developers where concurrent access to the catalogs is required. See also multi-developer support.
source code control system (SCCS)
A program for maintaining version control of the source files in a developing program. SCCS stores the changes made to a file instead of the changed file, thus allowing several versions of the same file to exist in the system.
source code data
Metadata, dependency properties, and other user-defined data that are created and updated periodically by running scanners against the source code. The data can be queried, edited, and used to analyze the impact of potential changes. Source code data is used by dependency builds to determine which dependant artifacts have changed and therefore require that buildable files be rebuilt.
source control data set
A linear data set (LDS) containing a storage management subsystem (SMS) configuration. The SMS configuration in an SCDS can be changed and validated using the Interactive Storage Management Facility (ISMF). See also active control data set, communications data set, control data set, SMS configuration.
A tool for debugging Integrated Language Environment (ILE) programs by displaying a representation of their source code. See also symbolic debugger.
A function that duplicates the semantics of another function, called a source function. Only scalar and aggregate functions can be sourced functions. See also function, routine, user-defined function.
source distributed data manager (SDDM)
In a distributed data management network, programming support that translates local data management requests for remote files or SQL requests for a remote database into a DDM request, establishes communications to the remote system where the data file or database is located, and sends the request to the remote (target) system for processing. See also target distributed data manager.
- A machine-readable collection of lines of text or images that is used for input to a computer program.
- A document that is going to be translated.
A file of programming code that is not compiled into machine language. See also data file.
source file variable
A text helper variable that holds the name of a file that contains an image or a recording of a question response, such as a .tiff file that contains a scanned image of a hand-written response or a sound file that contains a recording of an open-ended response in a CATI interview.
- A portion of a compiler listing that contains source statements and, optionally, test results.
- In the IBM 3800 Printing Subsystem, a listing of the overlay definition and messages after OGL has processed the definition.
See source program.
- A node that can import data stored in a particular format. Supported formats include fixed- and variable-length field files, as well as file formats from other IBM and non-IBM products.
- The node on which a data management event is generated.
- In communications, the program that starts a session with a remote system. See also target program.
- In DB2 for i5/OS, the source in an i5/OS source file member used to create an SQL program.
- A set of host language statements and SQL statements that is processed by an SQL precompiler.
- A set of instructions that are written in a programming language and must be translated into machine language before the program can be run.
source queue manager
See local queue manager.
During software upgrades, the version, release, and modification level of the installed product before a new level of the product is installed. See also target release.
source route bridging
In LANs, a bridging method that uses the routing information field in the IEEE 802.5 medium access control (MAC) header of a frame to determine which rings or token-ring segments the frame must transit. The routing information field is inserted into the MAC header by the source node. The information in the routing information field is derived from explorer packets generated by the source host.
In LANs, a method by which the sending station determines the route the frame will follow and includes the routing information with the frame. Bridges then read the routing information to determine whether they should forward the frame.
- A database or subsystem that contains the source tables for replication.
- A server that is being upgraded with new hardware or software or whose data is being migrated.
- In distributed data management (DDM), the function that converts source requests to data streams containing DDM commands and output data, and sends them over the network to the target server.
source service access point (SSAP)
In SNA and TCP/IP, a logical address that allows a system to send data to a remote device from the appropriate communications support. See also destination service access point.
- The system that sends information in a network of systems that exchange objects and data. See also target system.
- In communications, the system that issues a request to establish communications with another system.
- The system that currently owns the production copy of an independent disk pool in a cross-site mirroring (XSM) environment. Changes to the production copy of an independent disk pool are replicated to all mirror copies of the independent disk pool that exist on backup nodes within the recovery domain.
- The system that is being upgraded or migrated to a newer version of software.
- In distributed data management (DDM), a system containing an application program that requests access to data in another system.
A table that contains data that is to be replicated to a target table. See also target table.
- An existing type that is used to internally represent a distinct type.
- The data type from which a DISTINCT type is derived.
- In the application development tools, a characteristic of i5/OS members that allows the user to select a subset of the members available in a CoOperative Development Environment/400 session. Source types include i5/OS members with a particular member type.
source user ID
An ID which, when altered, has the change propagated to other systems by RRSF. See also target user ID.
A rule that controls which node, external organization, or group of nodes should be considered for sourcing a product or service request based on the product, product classification, ship-to region, and other parameters.
For IBM business, legal, marketing, or organizational contexts, the administrative region comprising France, some parts of Africa, Italy, Belgium, Netherlands, Luxembourg, Spain, Portugal, Greece, Italy, Turkey, and some parts of the Middle East. See also Europe, Middle East, and Africa, Northeast Europe.
See Scalable Parallel 2.
- Any storage area that can be directly accessed, down to its individual (8-bit) bytes, by a machine interface user such as a program or procedure.
- An object on the drawing that is composed of closed boundaries that are created to track the area and perimeter of the object. When the database form contains the AREA and PERIMETER attributes, records of these values are maintained and updated automatically.
- A basic unit of area, usually the size of a single character.
- In a neutral circuit, an impulse that causes the loop to open or causes absence of signal. In a polar circuit, it causes the loop current to flow in a direction opposite to that for a mark impulse. A space impulse is equal to a binary zero.
- A sequence of one or more blank characters.
- To cause a printer to move the paper a specified number of lines either before or after it prints a line. See also line feed.
- A site intended for storage of data, such as a location in a storage medium.
- A graphic character with an IBM GCGID of SP010000. On a typewriter, the space character is produced by movement (spacing or escapement) that does not imprint a graphic character. Unlike other graphic characters, space can sometimes be eliminated or lost, as when a space between words occurs at the end of a line of text. See also null character, numeric space, required space.
- In bar codes, the lighter element of a printed bar code symbol, usually formed by the background between bars. See also bar, intercharacter gap.
An evaluation of the use of spaces in a building or structure that enables users to determine the accuracy, efficiency, and utility of spaces. By using periodic space audits, users can track and compare space allocations, space usage, and space costs over time.
See thin provisioning.
See thin-provisioned volume.
- The process of managing aged data sets on DFSMShsm-managed and migration volumes. The three types of space management are migration, deletion, and retirement.
- See hierarchical storage management.
space monitor daemon
A daemon that checks space usage on all file systems for which space management is active, and automatically starts threshold migration when space usage on a file system equals or exceeds its high threshold.
A plan that is used to provide an environment for a planner to work with a set of planning data (supply and demand) for a given set of locations (scope). Space plans are created under a portfolio plan or subplan in the portfolio planning hierarchy.
space planning process
A process that is used to establish a space plan of record or to evaluate scenarios that are related to unplanned events. The process can be initated by routine planning cycles, strategic initiatives, mergers and acquisitions, an emergency response, or a business change event. Space planning processes can also be used to develop feasibility studies or contingency plans that do not go into an execution phase.
A specification that defines the attributes of a space, including capacity, average area, and which roles can be assigned. There must be a space standard specification for every space class.
space token (STOKEN)
An 8-byte identifier for an address space, data space, or hiperspace. A STOKEN is similar to an address space identifier (ASID), except for two important differences: the system does not reuse the STOKEN value while a program is running and data spaces do not have ASIDs.
In DCF, a unit of measure of horizontal or vertical space. In GML markup, the em is used when a measure that is relative to the current font size is required. When an absolute measure is required, as in specifying the depth of a figure, recommended space units are inches (nnI), millimeters (nnW), picas or points (nnPnn), or ciceros or didot points (nnCnn), where nn is the number of units.
A logical component consisting of a base card, which connects to the digital trunk adapter in the RS/6000, and a trunk interface card (TIC), which manages the trunk connection to the switch. See also VPACK, XPACK.
- See unsolicited email.
- To send unsolicited email to a large number of addresses.
- An attribute of a policy that defines the range of influence of a policy in a policy hierarchy. For example, the span attribute indicates whether a policy in a policy hierarchy is inherited only by its immediate child nodes or by its immediate child nodes and all their descendents.
- A user-defined group of network resources within a single domain. Spans provide a level of security by allowing the system administrator to define (a) the resources to which an operator can issue commands, (b) the views of resources that an operator can display, and (c) the resources in a view that an operator is allowed to see (an operator might not be authorized to see all the resources in a particular view). See also span of control.
- A logical record stored in more than one block on a storage medium.
- In the Virtual Storage Access Method (VSAM), a logical record whose length exceeds control interval length and, as a result, crosses, or spans, one or more control interval boundaries within a single control area.
In IPDS architecture, a method in which one command is used to start a sequence of constructs. Subsequent commands continue and terminate that sequence. See also control sequence chaining.
- A subgraph of a graph containing all the nodes of the graph and the minimal number of links of the graph to connect all the nodes.
- A loop-free subset of a network topology.
span of control
The total network resources over which a particular network operator has control. All the network resources listed in spans associated through profile definition with a particular network operator are within that operator's span of control. See also span.
The optimal number of spares that are needed to protect the drives in the array from failures. The system logs a warning event when the number of spares that protect the array drops below this number.
See resource pool.
- A small chart that presents trends and variations in a high number of data points.
- A line chart without axes and co-ordinates that shows variations over a period of time.
A dimension in a multidimensional database that has a low probability for occupying one or more data point in every combination of dimensions that occurs. For example, in a typical multidimensional database, the products dimension is often sparse since not every product is sold in every market. See also dense dimension.
The fraction of zeroes in a matrix. If matrix A is m by n , and A(i, j) != 0 for k of its elements, its sparsity is k/mn . Large linear programs tend to be very sparse, increasing as the dimensions get large.
- A method to link coordinates to a reference, so that objects whose coordinates are expressed in different systems can be displayed in the same manager.
- In DB2 Spatial Extender, a set of parameters that includes coordinates that define the maximum possible extent of space that is referenced by a given range of coordinates, an identifier of the coordinate system from which the coordinates are derived, and numbers that convert coordinates into positive integers to improve performance when the coordinates are processed.
A feature of Serial Storage Architecture (SSA) that enables a device adapter (DA) loop to support many simultaneous read/write operations. See also Serial Storage Architecture.
A function in which a calling process (the parent process) creates a new process called a child process. The child process inherits attributes from the parent process. A new program is specified and starts running in the child process.
See software package block.
See system power control network.
See session-layer protocol data unit.
speaker-dependent speech recognition
Identification of spoken words based on knowledge of the speech characteristics of one speaker. See also speaker-independent speech recognition.
speaker-independent speech recognition
Identification of spoken words based on aggregated knowledge of the speech characteristics of a population of speakers. See also speaker-dependent speech recognition.
The types of authority a user can have to perform system functions, including all object authority, save system authority, job control authority, security administrator authority, spool control authority, service authority, and system configuration authority. See also specific authority.
A category that groups a set of regular categories from any level in the same dimension, without regard to their normal hierarchical organization. For example, in a dimension called Management that includes the levels Senior Management, Middle Management, and Junior Management, it is possible to have a special category called Social Committee that includes specific personnel from each of these levels.
- A non-alphabetic and non-numeric character, such as %, &, /, ?, ], and a number of other characters that have a unique function in the SQL language.
- In REXX, a token that acts as a delimiter when found outside a literal string. Special characters include the comma (,), semicolon (;), colon (:), right parenthesis ()), left parenthesis ((), and the individual characters from the operators.
- A character that is not alphabetic, numeric, or blank. For example, a comma (,) or an asterisk (*).
- A graphic character that is not a letter, a digit, or a space character and not an ideogram.
- A character other than a digit, a letter, or one of these characters: $, #, @, ., or _. For example, the following characters are special characters: *, +, and %.
- In COBOL, a character that is neither numeric nor alphabetic.
special-character keyboard set
In System i Access, an optional keyboard set, used by Western European countries and the Americas, that contains special characters like the Spanish tilde or the international currency symbol.
- A file that provides an interface to input or output devices. There is at least one special file for each device attached to the computer.
- On AIX, UNIX, or Linux systems, a file that defines devices for the system, or temporary files that are created by processes. There are three basic types of special files: first-in, first-out (FIFO); block; and character.
Material handling procedures required by law, customer requirement, or company policy. Items requiring special handling can include, for example, hazardous materials, breakable items, or items of high value.
A set of arithmetic or logical constraints that expresses complicated relations between variables, for example, relations that would require a large number of arithmetic constraints. Specialized constraints enter into such considerations as counting values, maintaining load weights, and other critical activities. In most of the cases, a specialized constraint achieves more domain reduction than the equivalent set of basic constraints, and in all cases it performs domain reduction more efficiently.
specialized IT audience
Users whose primary domain of knowledge relates to the technical tasks of information technology (IT). This includes users such as programmers, database administrators, and network administrators. See also general purpose audience.
- In COBOL, compiler-created data items used to store information produced by specific COBOL features (for example, the DEBUG-ITEM special register).
- A storage area that is defined for an application process by the database manager and is used to store information that can be referenced in SQL statements. Examples are USER and CURRENT DATE. See also built-in global variable, global variable.
Text that allows document-placement information from views to be automatically recalculated as a postprocessing step. After the column formulas in a view are calculated, special text is replaced with an integer. For this reason, although special text appears to be a number, it is not.
- A variable that is similar to a local or global variable, except that it is predefined in Data Interchange Services. Special variables are created during translation at the start of a document and cannot be created or maintained by the user.
- In REXX, a variable set automatically by the language processor. Special variables are RC, RESULT, and SIGL.
special weight (SW)
In cultural sorting, the weight of special characters such as the percent, ampersand, and punctuation symbols. See also alphanumeric weight, case weight, diacritical weight, indifferent weight, level 4, mark weight.
- A declarative description of what something is or does.
- A representation or definition of the attributes for items (item spec), categories (category spec), locations (location spec), imports (file spec), exports (destination spec), lookup tables (lookup spec), or scripts (script input spec).
- A detailed document that provides a definitive description of a system for the purpose of developing or validating the system.
A series of system interfaces, headers, and utilities. Specification 1170 is a superset (with some changes) of the POSIX 1003.1 and POSIX 1003.2 standards. Specification 1170 is also a superset of XPG4 Base. It includes sockets, the SVID real-time model for interprocess communications, and miscellaneous interfaces.
A synchronous indication of a condition, caused by data that are incorrect or invalid, that was transmitted as the result of a channel command. The specification check condition appears in the status information sent to the channel.
See attribute definition.
specification node attribute
The types of authority a user can be given to use the system resources, including object authorities and data authorities. See also special authority.
specific function name
A particular user-defined function that is known to the database manager by its specific name. Many specific user-defined functions can have the same function name. When a user-defined function is defined to the database, every function is assigned a specific name that is unique within its schema. Either the user can provide this name, or a default name is used.
Entry point or interface to a CICS domain. A specific gate gives access to a set of functions that are provided by that domain only. The functions are likely to be requested by many different callers.
In VTAM, (a) the form of a RECEIVE request that obtains input from one specific session and (b) the form of an ACCEPT request that completes the establishment of a session by accepting a specific queued CINIT request.
See format resolution.
Speech Recognition Control Language (SRCL)
In WebSphere Voice Server, a structured syntax and notation used to define speech grammars. SRCL defines annotations, repetitions, words, phrases, and associated rules.
See Shortest Path First.
sphere of control (SOC)
In SNA, a collection of network node control points for which another system is acting as a focal point. This collection includes both control points explicitly defined by the customer, if the controlling system is a primary focal point, and control points assumed by the system if the controlling system is a default focal point.
- See schedule performance index.
- See system programming interface.
- See service provider interface.
- See stub programming interface.
- See Security Policy Index.
spill backup volume
A volume owned by DFSMShsm to which either all but the latest backup version of a data set are moved when more space is needed on a direct access storage device (DASD), daily, backup volume, or all valid versions are moved when a tape backup volume is recycled.
In Q replication, a dynamic queue that the Q Apply program creates to hold transactions that occur at the source table while a target table is being loaded. The Q Apply program later applies these transactions and then deletes the spill queue.
spill storage group
See overflow storage group.
See snap-in provided information.
A type of entry field that shows a scrollable ring of choices from which a user can select a choice. After the last choice is displayed, the first choice is displayed again. A user can also type a choice from the scrollable ring into the entry field without interacting with the spin button.
A UI function that increments or decrements a numeric value according to the specified increment until the maximum or minimum values are reached. A spinner can be applied to either a numeric field or to a date/time field that contains a "time" component.
See standard point location code.
An SPL routine that returns one or more values. See also stored procedure.
In the IBM 3800 Printing Subsystem, a flat surface located ahead of the transfer carriage tractors. The splicer has a vacuum plate and tractor drive pins that can be used to correctly align and put together the last sheet in an old box and the first sheet in a new box.
- To separate a cell into cells.
- The separation of a business process into one or more business processes or subprocesses to run simultaneously.
An error state that occurs when the images of data on each Netezza host are different. It typically occurs when synchronization is disabled and users change data independently on each Netezza host.
A separation of the nodes in a cluster by some type of communications failure. For example, in a four-node cluster, if two nodes are connected by a LAN switch that fails and the two nodes lose the communications link between the other two nodes, the cluster is deemed to have a split-brain incident. In a split-brain incident, each subset of nodes might behave as if it owned the resources that it had been configured to share; therefore, any coordination of those shared resources would result in unexpected behavior.
- A type of failure in which communication with the remote site is lost, but the remote site does not fail. This situation leads to a mirror split with two live sites where neither site mirrors the data.
- An error state that occurs when the images of data on each Netezza host are different. It typically occurs when synchronization is disabled and users change data independently on each Netezza host.
In OSI, the technique of a single transport connection using multiple network connections so that an application entity can use more than one line to send data on an association. Splitting can increase data throughput and resistance to network failure. It might be used, for example, to send a large file more quickly than if a single line were used. Splitting is available only with transport layer class 4.
A user-defined routine that is written in Stored Procedure Language (SPL). Its name, parameters, executable format, and other information are stored in the system catalog tables of a database. An SPL routine can be an SPL procedure or an SPL function. See also stored procedure, Stored Procedure Language.
See SNA Primary LU2 Support.
A variable that is declared with the DEFINE statement in an SPL routine. See also stored procedure.
See single program, multiple data.
See System Performance Measurement Interface.
See single point of control.
See secure point of entry.
spoofed source address
A source IP address that is not the actual source address of a datagram, but the address of a victim of an attack. All responses to the datagram are sent to this source IP address.
- The practice of masquerading as a trusted system to try to obtain confidential information. For example, when a would-be intruder sets up a client system with an IP address that is trusted by another system, it is called IP spoofing.
- The technique of faking the sending address of a transmission in order to gain illegal entry into a secure system.
- The system function of putting files or jobs into disk storage for later processing or printing.
- To reduce, through the use of auxiliary storage as buffer storage, processing delays when transferring data between peripheral equipment and the processors of a computer.
spool control authority
A special authority that allows the user to perform spooling functions, such as display, delete, hold, and release spooled files on the output queue for himself and other users. This authority also allows the user to change the spooled file attributes, such as the printer used to print the file.
A direct-access device used for intermediate storage of control blocks and data needed for processing jobs. During multiprocessing, the spool device becomes a collection point for job input data to be distributed to local mains, and for job output data coming from local mains on route to I/O devices attached to the global.
- A file containing output that has been saved for later printing.
- A file that is used in the transmission of data among devices.
- The sending of data to auxiliary storage for later processing. The most common spooling application is print spooling.
- The process of performing a peripheral operation such as printing while the computer is busy with other work.
A part of the system that provides the operating environment for the programs that read jobs onto job queues to wait for processing and write files from an output queue to an output device. IBM supplies one spooling subsystem: QSPL.
- In bar codes, the undesirable presence of ink or dirt in a bar code symbol space.
- A circular area on a printed sheet that is either darker or lighter than desired.
See Shared Product Object Tree.
A unique formatting and positioning of boosted search results in a graphic. See also boost.
A manual rate that the carrier submits for a shipment. The spot rate overrides the flat rate that is defined by the shipper. See also fixed rate.
A shipment status that indicates a carrier has placed the trailer at the destination. A user sets Drop Loaded Trailer as the status event, which causes the shipment status to change to Spotted.
See Subpool Queue Block.
See sync point services.
See SQL Processor Using File Input.
See Sequenced Packet Exchange protocol.
See system queue area.
See Structured Query Language.
SQL and XQuery compiler
A DB2 component that analyzes the semantics of an SQL or XQuery statement and produces an efficient executable form of the statement. See also section.
See SQL communication area.
SQL communication area (SQLCA)
A set of variables that provides an application program with information about the execution of its SQL statements, XQuery expressions, or requests from the database manager.
See SQL descriptor area.
SQL database DSA
A data source adaptor that retrieves information from relational databases and other data sources that provide a public interface through Java Database Connectivity (JDBC). SQL database DSAs also add, modify and delete information stored in these data sources.
SQL descriptor area (SQLDA)
A set of variables in a structure used in the processing of certain SQL statements that describe input variables, output variables, or the columns of a result table. The SQLDA is intended for dynamic SQL programs. See also system-descriptor area.
An expression that is used to select rows in a database table. The syntax for the filter is similar to the contents of an SQL WHERE clause. See also filter.
The generation of SQL statements in order to perform SQL pushback. See also SQL pushback.
See SQL authorization ID.
See Structured Query Language injection.
See Structured Query Language for Java.
The reordering of nodes within a stream in order to maximize the number of operations that can use SQL pushback. See also SQL pushback.
See SQL Procedural Language.
SQL Procedural Language (SQL PL)
A language extension of SQL that consists of statements and language elements that can be used to implement procedural logic in SQL statements. SQL PL provides statements for declaring variables and condition handlers, assigning values to variables, and for implementing procedural logic. See also Procedural Language SQL.
A user-written program that is implemented entirely by using a subset of SQL statements and SQL PL statements and that is invoked by using the SQL CALL statement. See also built-in procedure, procedure, routine, SQL routine, user-defined procedure.
SQL processing conversation
Any conversation that requires access of DB2 for z/OS data, either through an application or by dynamic query requests. See also conversation.
The execution of generated SQL statements by the data mining algorithms of a connected database, rather than by SPSS Modeler algorithms. SQL pushback can improve performance as data does not need to be extracted from the database for processing by the algorithm. See also SQL generation, SQL optimization.
- A component of certain SQL statements that specifies a result table.
- In query management, a type of query that is created by running an IMPORT command against a file containing an SQL statement.
- Any valid SQL statement in the dialect of the target database. This may be either data definition, such as CREATE TABLE, or data manipulation, such as SELECT.
A collection of database objects such as tables, views, indexes, functions, user-defined types, or triggers that defines a database. An SQL schema provides a logical classification of database objects.
SQL statement coprocessor
An alternative to the DB2 for z/OS precompiler that can be used to process SQL statements at compile time. The user invokes an SQL statement coprocessor by specifying a compiler option.
SQL string delimiter
See string delimiter.
See service request block.
See subrecord control byte.
See Speech Recognition Control Language.
See structure recovery data set.
See single root I/O virtualization.
See system resources manager.
SRM database object
See system resource management database object.
See service request number.
See Self-Regulation Organization.
See Secure Real-Time Transport Protocol.
See Signaling System 7.
See subsystem control block.
See system services control point.
In SNA, a session between a system services control point (SSCP) and a physical unit (PU); SSCP-PU sessions allow SSCPs to send requests to and receive status information from individual nodes in order to control the network configuration.
In SNA network interconnection, the technique used by the gateway system services control point (SSCP) to send session-initiation request units (RUs), by way of a series of SSCP-SSCP sessions, from one SSCP to another, until the owning SSCP is reached.
In SNA, a session between the system services control point (SSCP) in one domain and the SSCP in another domain. An SSCP-SSCP session is used to initiate and terminate cross-domain LU-LU sessions.
See resource takeover.
See solid-state drive.
See session-layer service data unit.
See software support facility.
See Secure Shell.
See secure shell/secure copy program.
See secure shell/Secure File Transport Protocol.
- See single system image.
- See server-side include.
- See system status index.
- See subsystem interface.
- See Security Support Provider Interface.
See subsystem identification block.
See subsystem identifier.
See server-side include injection.
See Secure Sockets Layer.
Authentication in which the server exchanges the server certificate with the client and, optionally, the client exchanges the client certificate with the server. This exchange determines whether the client and server have a certificate in common and verifies the identities of the server and, optionally, the client.
SSL server authentication
A type of authentication that allows a client to confirm the identity of a server. SSL-enabled client software uses standard techniques of public-key cryptography to ensure that the certificate and public ID of a server are valid and that the certificate and ID were issued from one of the client's trusted certificate authorities (CAs). See also certificate, certificate authority.
See Secure Sockets Layer virtual private network.
See subsystem options block.
See System Support Program.
See service support representative.
See subsystem support services.
See system service tools.
- An area of storage in which stack frames can be allocated.
- In kernel mode, an area that is paged with the user process. The kernel maintains a stack for each process. It saves the process information such as the call chain and local variables used by the kernel for the user process.
- An area in memory that typically stores information such as temporary register information, values of parameters, and return addresses of subroutines and is based on the principle of last in, first out (LIFO).
- See protocol stack.
stacked bar code
Horizontally stacked bar code with a row number identifier denoting how many rows (2-8) are stacked. Permits multiple bar code scanning in any order by sweeping top to bottom or bottom to top across the entire block.
Two or more sets arranged one above another in rows or side-by-side in columns. See also set.
In mainframe computing, the condition in which the control unit is in a holding status for the channel, and, the last time the control unit attempted to present the status, the channel responded with the stack-status control.
A volume that has a one-to-one association with physical tape media and is used in a virtual tape server (VTS) to store logical volumes (LVOLs). Stacked volumes are not used by MVS applications but by the VTS and its associated utilities. They may be removed from a VTS to allow transportation of LVOLs to a vault or to another VTS. See also container.
- See dynamic storage area.
- A section of the stack that contains the local variables, arguments, and register contents for an individual routine, as well as a pointer to the previous stack frame.
- The physical representation of the activation of a routine. The stack frame is allocated and freed on a last-in, first-out basis.
A contiguous area of storage obtained directly from the operating system. The Language Environment storage management scheme subdivides stack segments into individual dynamic storage areas (DSAs). If the initial stack segment becomes full, a second segment or increment is obtained from the operating system.
- See automatic storage.
- An area of storage used for suballocation of stack frames. Such suballocations are allocated and freed on a LIFO (last-in, first-out) basis. A stack is a collection of one or more stack segments consisting of an initial stack segment and zero or more increments.
An activity in a process that queries human interaction for decisions on how to proceed. A staff activity is used in a long-running process where the process will halt to await the outcome of the human interaction.
- Part of a scan phase in which AppScan either explores or tests the site. See also job design.
- A program that processes messages in a NetView pipeline. Stages send messages to each other serially.
- The element of a job design that describes a data source, a data processing step, or a target system and that defines the processing logic that moves data from input links to output links. A stage is a configured instance of a stage type. See also job design, operator, stage type.
- To move data from the production database to the staging database.
stage 2 system definition
The second part of the process of defining an IMS system. Stage 2 builds IMS system libraries, execution procedures, and the IMS online control program tailored to support the desired set of IMS functions. Stage 2 then stores these in an IMS library.
In the IBM 3800 Printing Subsystem, a font that can be loaded from the host processor into printer diskette font storage for use when printing selected graphic characters. See also nonstageable font.
An object that defines the capabilities of a stage, the parameters of the stage, and the libraries that the stage uses at run time. See also stage.
- See resource manager cache.
- An area into which subsystem interface routines store data to be transferred between address spaces. Staging areas can be contained in the common service area (CSA) or in an address space used by auxiliary storage.
- The area of the file system that can store both data that will be imported (it is identified as the data source) and data that has been exported (it can be identified as the distribution). See also export, import.
staging configuration directory (SCD)
The directory in which program-specific ODM object classes are stored temporarily during a dynamic reconfiguration operation. See also active configuration directory, default configuration directory.
Those libraries that are modified by offline functions in a system using online change. Changes are first applied to the staging libraries, which are then copied to the inactive libraries.
An instance of a WebSphere Commerce Server that is used for testing purposes before new functions or data are deployed to the production server. See also authoring server, production server, production-ready data.
- An intermediate table that is written to from an external system and used to populate business object tables.
- In SQL replication, a consistent-change-data table that is used to save data before that data is replicated to the target database. A consistent-change-data table used for staging data can function as an intermediate source for updating data in one or more target tables. See also consistent-change-data table, SQL replication.
- A temporary database table that is used to hold data for further processing. A staging table might be created automatically by the system, or the administrator might have to create it for a specific purpose.
- Independent of any other device, program, or system. In a network environment, a stand-alone machine accesses all required resources locally.
- Pertaining to a program that can run separately from the DB2 database system, without using DB2 services.
A streams processing application that runs locally as an executable file and does not require the runtime system. See also distributed application.
- A fully operational server that is managed independently of all other servers, using its own administrative console.
- A catalog service or container server that is managed from the operating system that starts and stops the server process.
- A system that runs application programs independently of another system. The exchange of data files or applications with another system is done manually, through portable media, such as diskette or tape.
- A DirectTalk system that is not part of a single system image (SSI). A stand-alone system is not connected to other DirectTalk systems, so it contains its own application and voice data.
- User-specified open intervals for a typical day at a workstation.
- A set of clearly defined and agreed-upon conventions for specific programming interfaces which have been approved by a formally constituted standards-setting body.
- See measuring and test equipment.
standard access list
See access list.
standard allowable minutes (SAM)
A value that is defined by a warehouse to determine how much time is allocated for each activity, including receiving, pallet moves, case replenishment, and special ticketing.
standard connector configuration properties
Configuration settings typically used by the connector controller to manage the connector (for example, to set the trace level, log file name, or polling information). These settings are generic for all connectors. See also connector configuration property, connector-specific configuration property.
In high availability disaster recovery, a database that is neither the primary nor the standby. A standard database is not configured for high availability disaster recovery. See also high availability disaster recovery.
A measurement of how varied the values in a frequency distribution are from the average value of the distribution. A low standard deviation value means that the values are close to the average value, whereas a high standard deviation value means that the values are more widely dispersed over a large range of values.
See EDI envelope.
standard event reader
A service that monitors a database for new, updated, and deleted events and triggers policies based on the event data. See also event reader.
An exit routine that is called to derive the value for a destination column in a column map. See also exit routine.
Standard Generalized Markup Language (SGML)
A standard metalanguage for defining markup languages that is based on the ISO 8879 standard. SGML focuses on structuring information rather than presenting information; it separates the structure and content from the presentation. It also facilitates the interchange of documents across an electronic medium.
standard input (STDIN)
An input stream from which data is retrieved. Standard input is normally associated with the keyboard, but if redirection or piping is used, the standard input can be a file or the output from a command. See also standard error.
standard I/O board
A board that provides access to a group of I/O functions that are basic to most system units. Common standard I/O functions are keyboard, tablet, speaker, mouse, serial port, parallel port and diskette adapter.
A process that separates records into parts, changes them to implement enterprise data quality standards, and potentially enriches the data for when it is used. See also standardization rule.
One or more conditions, such as a pattern, and the associated set of actions, which is used to standardize data. See also action, condition, pattern, pattern-action language, standardization.
In the Simple Network Management Protocol (SNMP), a MIB module that is located under the management branch of the Structure of Management Information (SMI) and that is considered a standard by the Internet Engineering Task Force (IETF).
standard output (STDOUT)
The output stream to which data is directed. Standard output is normally associated with the console, but if redirection or piping is used, the standard output can be a file or the input to a command. See also standard error.
standard point location code (SPLC)
A code that the National Motor Freight Traffic Association assigns to many freight origin and destination locations. See also location code.
A configuration option shared by all instances of a particular WebSphere business integration component, such as all collaborations or all connectors. These properties differ from options that are unique to a particular component. See also property.
A rule that allows access to functions necessary for mapping operations more complex than simple linking but less complex than extended rules. Standard rules are mutually exclusive (only one can be used on a particular field).
Standards Council of Canada (SCC)
A federal Crown corporation that has the mandate to promote efficient and effective standardization in Canada through the development and deployment of standards. It is the Canadian national member for ISO.
A term in a business glossary that has been thoroughly evaluated and approved by the team and that has been defined as definitively describing a characteristic of the enterprise or organization. See also candidate term.
A volume that emulates one of several S/390 volume types, such as the 3390-2, 3390-3, 3390-9, 3390-2 (3380-track mode), or 3390-3 (3380-track mode). A standard volume presents the same number of cylinders and capacity to the host as the native S/390-volume type of the same name presents. See also custom volume.
Standard Widget Toolkit (SWT)
An Eclipse toolkit for Java developers that defines a common, portable, user interface API that uses the native widgets of the underlying operating system. See also Abstract Window Toolkit, Swing Set.
In high availability disaster recovery, a copy of the primary database. Updates to this database occur by rolling forward log data that is generated on the primary database and sent to the standby database. See also auxiliary HADR standby database, high availability disaster recovery, principal HADR standby database.
- The host server that is in a passive mode. The standby host becomes the active host when a user manually migrates control from the active host to the standby host or in a case of failover.
- The logical partition that acts as a standby for an administration host, a management host, or a data host. The standby host can take ownership of the resources from only the same type of failed active host and process the workloads intended for that failed host.
See boot interface.
A device that assumes the identity of a primary node if the primary node fails or is taken out of service. The standby node runs the primary node's workload until the primary node is back in service. See also primary node.
standby queue manager instance
An instance of a running multi-instance queue manager ready to take over from the active instance. There are one or more standby instances of a multi-instance queue manager.
- A grouping of options in a configuration file to control various aspects of compilation by default.
- A section of a software package that defines either a specific action to be performed on that the software package or a set of conditions under which actions are to be performed on the software package. The complete software package is a stanza that contains a hierarchy of many different stanzas. See also software package, software package definition.
- A group of lines in a file that together have a common function or define a part of the system. Stanzas are usually separated by blank lines or colons, and each stanza has a name.
- A type of relational database schema that is composed of a set of tables comprising a single, central fact table surrounded by dimension tables. See also dimension table, star join.
- A simple schema that represents each dimension in a single table. Levels of the dimension are represented as columns within this table. The primary key of this table is the member identifier of the lowest dimension level. See also metadata schema.
star schema data model
A relational schema whose design represents a multidimensional data model. The star schema consists of one or more fact tables and one or more dimension tables that are related through foreign keys.
A point in time associated with the start of work and usually qualified as actual, planned, estimated, and scheduled. Start date combined with duration and dependencies permits the calculation of finish date.
started-task computer workstation
A computer workstation that supports started tasks as a result of giving the workstation the STC option. Operations defined to this workstation are treated as started tasks, not as jobs.
- An example of GML support that is provided with DCF. It consists of a document-type description for general documents, a profile, and a library of APFs.
- In the OSI Communications Subsystem licensed program, the subset of the programming interface that can be used by customer programs that use simplified data communications.
An event that indicates where a process starts. The start event starts the flow of the process and does not have any incoming sequence flow but can have a trigger. Start event types are none, message, timer, ad hoc, and error. See also ad hoc start event, error start event, message start event, none start event, timer start event.
- A node that identifies where a process begins.
- A node that identifies where a rule flow begins. A rule flow has one and only one start node.
start-of-text character (STX character)
In binary synchronous communications, a transmission control character used to begin a logical set of records that will be ended by the end-of-text character or end-of-transmission-block character.
In VTAM, a user-specified or IBM-supplied option that determines certain conditions that are to exist during the time a VTAM system is operating. Start options can be predefined or specified when VTAM is started.
Pertaining to asynchronous communications line control that uses start signals and stop signals to control the transfer of data over a communications line. Each group of signals representing a character is preceded by a start signal and followed by a stop signal. See also asynchronous communication.
- A character including one start signal at the beginning and one or two stop signals at the end. (I)
- In bar codes, a special bar code character that provides the scanner with start and stop reading instructions as well as a scanning direction indicator. The start character is normally at the left end and the stop character at the right end of a horizontally oriented symbol.
In bar codes, a special bar code character that provides the scanner with start and stop reading instructions as well as a scanning direction indicator. The start character is normally at the left end and the stop character at the right end of a horizontally oriented symbol.
A process in which a joining or reintegrating node acquires a resource group that previously remained offline. A startup policy can also be specified for a resource group. See also distribution policy, fallback, fallover, resource group, resource group policies, settling time.
See start Uniform Resource Locator.
- A file that hides other data files within it.
- A file that stores an encrypted version of the key database password. See also key database, key file.
- The situation of a conversation from the point of view of one of the participating transactions. The conversation state determines the commands (if any) that a transaction can validly issue. The state of each transaction changes dynamically in the course of a conversation. See also state variable.
- An indication associated with an icon, color, and severity level assigned to a situation at a point in time. A situation can reflect one of the following states: critical, warning, or informational.
- A stage in the lifecycle of an object that identifies the status of that object.
- One step in the logical sequence of actions that comprises a voice application.
- A condition or situation during the life of an object during which it satisfies some condition, performs some activity, or waits for some event.
- A record taken at each choice point during the search for a solution. The record includes information on all constrained variables, their current values, their domains, and constraints upon them.
- The attribute of a program that determines the domain of objects that it can access directly.
- An object's characteristic that is manifested in its public and private data members, and can be divided into two categories: essential state and non-essential state.
- In a business state machine, one of several discrete individual stages that are organized in sequence to compose a business transaction.
- A condition in which the circuit remains until application of a suitable pulse.
- In the OSI Communications Subsystem licensed program, a change in the status of an application entity or association--for example, an application entity changing from activated to deactivated.
- In the OSI Communications Subsystem licensed program, an event that indicates that a resource--such as a line--has had a change in status. State change events are logged and generate a message to the operator.
Information that must be kept in Resource Manager (RM) so that users can sign onto another IMS and resume their states. See also significant data.
Of or pertaining to a system or process that keeps track of the state of interaction. See also stateless.
stateful image profile
A profile for packaged-based provisioning. Package-based provisioning loads the operating system image onto persistent storage. Changes that are made to the operating system image are persistent across node reboots.
stateful session bean
A session bean that acts on behalf of a single client and maintains client-specific session information (called conversational state) across multiple method calls and transactions. See also session bean, stateless session bean.
A view that contains the results of aggregations derived from past data streams in a single row. A view is stateful if it contains a set function or moving set function in the SELECT clause, or contains a GROUP BY clause (in which case there is one row for each group), or is derived from another stateful view.
A function that is used to describe the state of a feature of the problem as a non-negative integer. For example the various operating temperatures of an oven can be described as a state function.
Having no record of previous interactions. A stateless server processes requests based solely on information that is provided with the request itself, and not based on memory from earlier requests. See also stateful.
stateless image profile
A profile for stateless image-based provisioning. Stateless image-based provisoning loads the operating system image into memory. Changes that are made to the operating system image are not persistent across node reboots.
- A session bean that is a collection of operations. The server can optimize resources by reusing bean instances on every method call.
- A session bean with no conversational state. All instances of a stateless bean are identical. (Sun) See also session bean, stateful session bean.
state machine diagram
A UML behavioral diagram that models the dynamic behavior of individual class objects, use cases, and entire systems. There are two types of state machines: behavioral and protocol.
- In programming languages, a language construct that represents a step in a sequence of actions or a set of declarations.
- An instruction in a program or procedure.
A unit of SPL program code that performs a particular task and is usually marked by the keywords begin and end. The statement block of an SPL routine is the smallest scope of reference for program variables.
The portion of the package cache related to dynamic SQL statements. See also package cache.
A mechanism that modifies dynamic SQL statements at the database server so that SQL statements with similar but not identical text can share the same access plan. The modified and original statements produce the same results.
In FORTRAN, a name, followed by a list of dummy arguments, that is equated to an arithmetic, logical, or character expression, and that can be substituted for the expression throughout the program.
The data object that contains information about an SQL statement or XQuery expression that is managed by the DB2 call level interface. Such information includes dynamic arguments, bindings for dynamic arguments and columns, cursor information, result values, and status information. Each statement handle is associated with a connection handle. See also connection handle, handle.
- An SQL identifier that enables the GOTO label statement to transfer program control to the first executable statement that follows the declaration of the specified statement label.
- In FORTRAN, a number containing 1 - 5 decimal digits that is used to identify a statement. A statement label is usually used to transfer control, define the range of a DO loop, or refer to a FORMAT statement.
statement local variable (SLV)
An SPL, C, or Java function that is invoked in the WHERE clause of a query, which can declare one or more statement-local variables that are visible in other parts of the same query, including its subqueries.
statement optimization guideline
An optimization guideline that applies to a single DML statement. See also optimization guideline.
A unit of SQL that includes an SQL query (which may or may not return a result set), a command (which does not return a result set), or a stored procedure invocation (which may or may not return a result set). Each statement record is associated with a single data source.
state table action
One instruction in a set of instructions contained in a DirectTalk state table that controls how DirectTalk processes various operations such as playing voice prompts or recording voice messages.
state transition model
The sequence of states that a change request goes through from submission through disposition. This model specifies the actions that a user can take to move a change request from one state to another.
A program can obtain values that indicate the conversation state. CICS places such values in a variable named by the program, known as the state variable. See also state.
- In C++, a keyword used for defining the scope and linkage of variables and functions. For internal variables, the variable has block scope and retains its value between function calls. For external values, the variable has file scope and retains its value within the source file. For class variables, the variable is shared by all objects of the class and retains its value within the entire program.
- A Java programming language keyword that is used to define a variable as a class variable.
- Pertaining to an operation that occurs at a predetermined or fixed time. See also dynamic.
statically known namespaces
In XQuery, a set of prefix and URI pairs that defines all of the namespaces that are known during static processing of an expression. Statically known namespaces are a component of the static context of an expression.
The process of extracting targeted types of information on the models in their static form. This differs from dynamic analysis, which extracts information based on the results of process simulations.
A process by which SQL statements are bound after they are precompiled. All static SQL statements are prepared for execution at the same time. See also automatic bind, dynamic bind, incremental bind.
- The act of resolving references to external variables and functions before run time.
A type of call in which the program is link-edited into the same load module as the calling program. See also dynamic call.
A Java™ class that is defined at compilation time. See also dynamic attribute model.
static class descriptor table
An optional portion of the CDT that can be defined by the client or supplied by IBM. See also dynamic class descriptor table.
- Data that retains its last-used state across calls.
- Data that is stored in static storage. See also automatic data.
In text formatting, a block of text that the nroff command places on the current page only if there is room for the entire block. If there is not enough room, the nroff command starts a new page and places the block of text there. See also floating display.
static IP address
A fixed IP address for a persistent device or logical unit on a network that uses the IP standard. See also IP address.
An element of a data model that defines a static relationship between data items in internal data types. See also link.
The incorporation of procedures and data into a load module at build time, instead of dynamically loading them at run time. Compared to dynamic linking, static linking increases the size of the executable file. See also dynamic linking.
See class method.
See static network address translation.
static network address translation (static NAT)
A one-to-one mapping of IP addresses that allows a user to map an IP address on an internal network to an IP address that is to be made public. If static NAT is used, traffic can be initiated from either side of the connection. See also network address translation.
- A node that can be used to submit documents for approval to specific individuals.
- A VTAM node defined by the IMS system definition.
A phase of the IPL sequence that takes place prior to limited paging during which only predefined areas of the load-source disk unit can be accessed. See also full paging, limited paging, prestatic paging.
static power save mode
An IBM System z (z196) function used for periods of low utilization or potentially when a CBU system is sitting idle waiting to take over in the event of a failure. The server uses frequency and voltage reduction to reduce energy consumption of the system. Static power save mode is initiated by the customer using the HMC/SE or Active Energy Manager.
static procedure call
A high-level language (HLL) call statement that specifies the name of an Integrated Language Environment (ILE) procedure to be called. See also procedure pointer call.
static program call
A connection among programs during binding (program creation time). See also dynamic program call.
A type of ranking in which factors about the documents that are being ranked, such as date, the number of links that point to the document, and so on, augment the rank. See also dynamic ranking, ranking, text-based scoring.
A method of setting paths between hosts, networks, or both by manually entering routes into the routing table. Static routes are not affected by routing daemons and must be updated manually.
A copy-group serialization value that specifies that a file must not be modified during a backup or archive operation. If the file is in use during the first attempt, the backup-archive client cannot back up or archive the file. See also dynamic serialization, serialization, shared dynamic serialization, shared static serialization.
SQL statements that are embedded within a program and are bound before the program is executed. After being bound, a static SQL statement does not change, although values of host variables specified by the statement can change. See also deferred embedded SQL, dynamic SQL, embedded SQL, incremental bind statement.
An area that is allocated by the system when a program is activated. Static storage exists as long as the program activation exists. If the program has not been deactivated, the values in the storage persist from one call to another. See also automatic storage, dynamic storage.
static system symbol
In MVS, a symbol whose substitution text is defined at system initialization and remains fixed during the initial program load (IPL). Static system symbols are used to represent fixed values, such as system names.
A terminal created through the system definition process. See also dynamic terminal.
- Text that is always included in the screen entry or print translation object. Examples of static text include legends and column headings.
- Text that remains constant on every document created with a particular form, as opposed to fields in which the user types or in which Notes calculates information.
static transaction routing
Non-dynamic terminal-initiated transaction routing. The transaction routing request is routed to a predetermined system. Static transaction routing occurs when DYNAMIC(NO) is specified in the transaction definition and the request is routed to the system named in the REMOTESYSTEM attribute.
A variable that is allocated as soon as a program starts running and that remains allocated until the program stops. Normal scoping rules apply to the variable. See also automatic variable.
static web project
A project that contains resources for a web application with no dynamic content such as servlets or JavaServer Pages (JSP) files, or Java code. A static web project can be deployed to a static HTTP server and does not require additional application server support.
- A computer or device that can send or receive data.
- A location in a warehouse where an activity is performed.
- A point or location on a site where work is performed, usually a valve or transformer.
- An input or output point of a system that uses telecommunication facilities; for example, one or more systems, computers, terminals, devices, and associated programs at a particular location that can send or receive data over a telecommunication line. See also attaching device.
station management (SMT)
A Fiber Distributed Data Interface (FDDI) standard that specifies the local portion of the system management application process for FDDI, including the control required for proper operation of a station in an FDDI ring.
In Performance Toolbox, the lines in a list that represent a specific value. See also context line.
Major component of CICS that controls the collection of resource statistics for a CICS system. It collects data at user-specified intervals, at shutdown and logical end-of-day, and when requested by the user.
statistics utility program (DFHSTUP STUP)
CICS program that provides offline formatting of CICS statistics. DFHSTUP can format all types of statistics generated by CICS and provides a summary function to collect all statistics produced in a given period. See also summary report.
- An activity posted on a user's profile.
- The state of a transaction at a particular point in time, such as whether it failed, was successful, or slow.
- The true or false condition of a situation.
- A property of a contract that represents its current stage and restricts or enables certain user or system actions.
- An attribute of a configuration item or other record, indicating the artifact's stage in the associated lifecycle.
- The current condition or state of a program or device, for example, the status of a printer.
- The processing stage of a document or interchange, indicated in the status box.
- The state of a job or job stream instance. See also internal status.
- A section of an application window that defines information about a selection, command, or process. It also defines menu bar items as the user highlights each item, and indicates any current keyboard-initiated modes for typing (for example, CAP for the Caps Lock key or NUM for the Num Lock key).
- In System i Access, the part of a window that displays information indicating the current state of that window's content.
- Code that represents the current state of an operation. The status code is often associated with an extended status code.
- In printers, two hexadecimal numbers associated with printer conditions.
- In VTAM, information on the status of a resource as shown in a 10-character state code; for example, STATEACTIV for active.
- A two-character code in the program communication block (PCB) mask that indicates the results of a DL/I call. See also PCB mask.
status recovery mode
The scope of recovery for a resource, it determines where the resource status can be recovered from. GLOBAL indicates the status is managed by RM, LOCAL indicates the status is managed by IMS in local control blocks and log records, and NONE indicates the status is not recovered.
A web page that facilitates comprehensive information supply at status level for monitoring incoming data from data sources. For example, a status view can contain a consolidated view of data that is displayed as key performance indicators.
See standard error.
See standard input.
See standard output.
- The root of an inflected or derived word form that is obtained by stripping off inflectional or derivational affixes, for example: 'polit' is the stem of 'political'. A stem does not have to be a valid word. See also lemma, stemmer.
- In REXX, that part of a compound symbol up to and including the first period. It contains just one period, which is the last character. It cannot start with a digit or a period. A reference to a stem can also be used to manipulate all variables sharing that stem.
A component that identifies or derives stems from words in a data source. See also stem.
See word stemming.
A pattern of memory references used for averaging. For example, a 4-point stencil in two dimensions for a given array cell, x(i,j), uses the four adjacent cells: x(i-1,j), x(i+1,j), x(i,j-1), and x(i,j+1).
- A single user action that is captured by one of the Tealeaf client frameworks and submitted to Tealeaf for capture in JSON format.
- A stage in a workflow where a distinct, well-defined action is performed. Each step on a workflow map represents a specific activity or task in the business process described by the map. For example, in insurance claims processing, verify account number and calculate deductible could be individual steps. A workflow consists of two or more steps.
- A component of a project or library that contains one or several command lines to be executed.
- To cause a computer to run one operation.
- A part of an XQuery path expression that generates a sequence of items and then filters the sequence by zero or more predicates. The value of the step consists of those items that satisfy the predicates. See also node test, path expression.
The system function that establishes a logical connection between a running program and a data set, device, or volume in preparation for running the program. See also dynamic allocation.
A restart that occurs at the beginning of a job step. There are two types of step restart: automatic or deferred. See also checkpoint restart.
The computation of the steps and substeps of a scale. Two types of steps definition are available: numerical steps definition, which handles numeric steps values; time steps definition, which handles time values.
stepwise linear function
A special case of the piecewise linear function where all slopes are equal to zero. The primary use of a stepwise linear function is in scheduling, typically used to model the efficiency of a resource over time. In all uses with scheduling, the domain and image of the function are limited to integers.
Sterling TMS number
A code that shippers and customers can use to refer to the same location. Sterling TMS automatically assigns this number to each location. See also location code.
The user or group of users that is responsible for the definition, purpose, and use of business glossary assets or the information assets that are described in the metadata repository. The steward does not have to be a user of the business glossary.
See self-timed interface.
A type of access permission bit that causes an executable program to remain on the swap area of the disk. Only someone with root authority can set the sticky bit. This bit is also used on directories to indicate that only file owners can link or unlink files in that directory.
An input method that enables the user to press and release a series of keys sequentially (for example, Ctrl+Alt+Del), yet have the keys behave as if they were pressed and released at the same time. This method can be used for those who require special-needs settings to make the keyboard easier to use.
The part of the page pool that is made available to cache the first block of frequently used interactive files. Sticky pool size is one of the file manager startup configuration parameters.
See information frame.
In Performance Tools, the interface at the S and T reference points defined in the reference model of the integrated services digital network (ISDN). When there is no network termination 2 (NT2), the S and T reference points become one S/T point.
See Synthetic Transaction Investigator playback policy.
See simple text language.
See sense type and model.
stock keeping unit (SKU)
An alphanumeric identifier for each item of merchandise, or catalog entry. The smallest unit available for keeping inventory control. It can include variables for department, class, vendor, style, color, size, and location. See also package, product.
See shoot the other node in the head.
- The arrival of a vehicle at a site to pick up or deliver one or more shipments (or both) and then leave. See also route ID, visit.
- A point where passengers can board or alight from vehicles.
stop and go light
See traffic lighting.
In Performance Toolbox, a special type of value record which signals that recording was stopped for a set of statistics and gives the time it happened. This allows programs using the recording file to distinguish between gaps in the recording and variances in the recording interval.
- A word that is commonly used, such as "the," "an," or "and," that is ignored by a search application.
- A frequently occurring word that many natural language processing (NLP) applications identify as such, to improve processing.
- A word that adds no meaning to an organization name and that is not included in any name comparison or name scoring.
- The location of saved information.
- A functional unit into which data can be placed, in which it can be retained, and from which it can be retrieved. See also virtual storage.
storage accounting area (SAA)
A field at the start of a CICS storage area that describes the area and enables CICS to detect some storage violations. Each CICS storage area has either an SAA or a storage check zone.
A person in the data processing center who is responsible for defining, implementing, and maintaining storage management policies. See also system operator.
storage architecture type (storage type)
The type of storage architecture, either count key data (CKD) or fixed block (FB), for which an array, pool, or volume is provisioned. See also count key data, fixed-block architecture.
storage check zone
A pair of fields at the beginning and end of a CICS storage area that enable CICS to detect some storage violations. Each CICS storage area has either a storage check zone or a storage accounting area (SSA).
- In WebSphere MQ for z/OS, the page set that is to hold the messages for a particular queue. The storage class is specified when the queue is defined.
- A named list of data-set storage attributes that identify performance goals and availability requirements. A storage class is defined by the storage administrator to select a device that can meet those goals and requirements.
- The type of media that an object is stored on. It is not directly associated with a physical location; however, it is directly associated with the device manager. See also storage group, storage system.
Any of the predefined models (data class, management class, storage class, and storage group) that are used to classify storage management needs and procedures for data sets under the storage management subsystem (SMS). Each data set has construct names associated with it, by explicit specification or by default. See also data class.
- In CICS, a facility that controls requests for main storage to provide intermediate work areas not automatically provided by CICS.
- The component in a storage subsystem that handles interaction between processor channel and storage devices, runs channel commands, and controls storage devices. Storage control is an example of a control unit.
storage controller enclosure
See control enclosure.
A noncontiguous area of storage in the dynamic storage areas reserved for use by CICS when processing a short-on-storage condition. See also short-on-storage.
- A logical unit number (LUN) that terminates a collection of ports on the storage network.
- A physical unit that provides a mechanism to store data on a given medium so that it can be subsequently retrieved.
A physical or logical element that manages multiple paths to storage components, such as devices or controllers. See also storage path.
An external storage device that is connected directly to a storage system. Storage enclosures provide storage capacity to the system in the form of hard disk drives (HDDs), flash drives or flash modules.
storage expansion enclosure
See expansion enclosure.
- A collection of storage volumes and attributes that are defined by the storage management subsystem (SMS) administrator to meet a defined service strategy. The collections can be a group of direct access storage device (DASD) volumes; tape volumes; or a group of DASD, optical, or tape volumes treated as a single, object-storage hierarchy. See also object backup-storage group, object storage group, pool storage group, tape storage group, virtual input/output storage group.
- A named set of storage paths on which DB2 for Linux, UNIX, and Windows data can be stored.
- The user-defined partition of a database.
- A named set of disks on which DB2 for z/OS data can be stored.
- A group that associates a storage system to a storage class. See also storage class, storage system.
- An arrangement of storage devices with different speeds and capacities. The levels of the storage hierarchy include: main storage, such as memory and direct access storage device (DASD) cache; primary storage (DASD containing user-accessible data); migration level 1 (DASD containing data in a space-saving format); and migration level 2 (tape cartridges containing data in a space-saving format). See also hierarchical storage management, migration level 1, migration level 2, object storage hierarchy, primary storage.
- A logical order of primary storage pools, as defined by an administrator. The order is typically based on the speed and capacity of the devices that the storage pools use. The storage hierarchy is defined by identifying the next storage pool in a storage pool definition. See also storage pool.
A key associated with each 4 KB block of storage that is available in the CICS region. Access to CICS storage is controlled by key-controlled storage protection. When key-controlled protection applies to a storage access, a store operation (write) is permitted only when the storage key matches the access key associated with the request; a fetch (read) is permitted when the keys match or when the fetch-protection bit of the storage key is zero. In most cases, the access key for a storage operation is the PSW key in the current PSW.
- A location physically separate from the removable media library where volumes are stored for disaster recovery, backup, and vital records management. See also inventory management.
- In Backup, Recovery, and Media Services, a place where media and containers can be stored awaiting expiration or movement to another location such as off-site storage, vaults, or long-term (permanent) retention. Backup, Recovery, and Media Services has two predefined locations that can be overridden by the user: 1) *HOME, the system keyword for the on-site library (or home location); and 2) VAULT, a default storage location that refers to the default off-site storage location.
- A specific space (floor space, shelf, rack) used to store material. Each storage location has a distinct identifier known by the warehouse management system and warehouse operator.
storage-location management processing
In DFSMSrmm, the process of inventory management that assigns a shelf location to each volume that has moved as a result of vital record processing. See also inventory management, vital record processing.
The activities of data set allocation, placement, monitoring, migration, backup, recall, recovery, and deletion. Storage management can be performed either manually or using automated processes. The storage management subsystem (SMS) automates these processes while optimizing storage resources. See also storage management subsystem.
storage management cycle
An invocation of the OAM Storage Management Component (OSMC). The purpose of the storage management cycle is to ensure that every object scheduled for processing is placed in the correct level of the object storage hierarchy (as specified by its storage class), has expired or is backed up (as specified by its management class or by an explicit application request), and, if necessary, is flagged for action during a subsequent storage management cycle.
Storage Management Initiative Specification (SMI-S)
A design specification developed by the Storage Networking Industry Association (SNIA) that specifies a secure and reliable interface with which storage management systems (SMSs) can identify, classify, monitor, and control physical and logical resources in a storage area network (SAN). The interface integrates the various devices to be managed in a SAN and the tools used to manage them.
storage management station
A system that is used to manage the storage subsystem. A storage management station does not need to be attached to the storage subsystem through the fibre-channel I/O path.
storage management subsystem (SMS)
Software that automates as much as possible the management of physical storage by centralizing control, automating tasks, and providing interactive controls for system administrators. See also storage management.
A layer of a server that handles the mapping of data to the appropriate location in the server memory. The storage manager controls lock, index, data, allocation, and transaction management functions.
Storage Manager Enterprise Management window
See graphical user interface.
A creation attribute for modules, programs, and service programs that describes the type of storage supplied by the system at run time for automatic, static, and constant storage. The system-recognized identifiers for storage model are *SNGLVL (single-level store), *TERASPACE (teraspace), and *INHERIT (inherit). *INHERIT, which is specified only for modules and service programs, indicates that the object must be created such that it will run when either single-level store or teraspace is supplied.
- A component of a storage system that provides internal storage or a connection to one or more external storage systems.
- A node used to provide the back-end storage and file system to store the data in a system.
The hardware within storage control that transfers data between the direct access storage device (DASD) and a channel. See also storage director.
- A subcomponent of a network-attached storage (NAS) system that consists of two or more storage nodes and one or more supported storage systems.
- A logical entity of components of a system consisting of two storage nodes, and one or two storage subsystems directly connected with these storage nodes.
- A grouping of storage space consisting of volumes, logical unit numbers (LUNs), or addresses that share a common set of administrative characteristics. See also user pool.
- A reserved area of virtual disk space that serves storage requirements. See also volume.
- A collection of storage that identifies an underlying set of resources. These resources provide the capacity and management requirements for a volume or set of volumes.
- A logical division of storage reserved for processing a job or group of jobs.
- A named set of storage volumes that is the destination that is used to store client data. See also active-data pool, copy storage pool, primary storage pool, storage hierarchy.
- A logical division of storage (directories, cooked files, and raw devices) reserved for automatically expanding existing storage spaces (dbspace, temporary dbspace, sbspace, temporary sbspace, or blobspace).
- A collection of storage capacity that provides the capacity requirements for a volume.
An engine's connection point to a storage client network. A storage port is a member of a single fabric. See also engine.
storage privilege class
A privilege class that gives an administrator the authority to control how storage resources for the server are allocated and used, such as monitoring the database, the recovery log, and server storage. See also privilege class.
An optional facility in CICS Transaction Server that enables users to protect CICS code and control blocks from being overwritten inadvertently by application programs. See also transaction isolation.
- An indicator that appears in the current program status word whenever an associated task has control of the system. This indicator must match the storage keys of all main storage blocks that the task is to use.
- A hardware key associated with each page of virtual memory that is available in POWER6 processors and is supported as of AIX Version 5.3 with the 5300-06 Technology Level. Access to pages is controlled on a per-thread basis depending on the access mode of the running thread as represented in the authority mask register (AMR). See also authority mask register.
storage resource group
A named collection of logically related resources that are monitored by Tivoli Storage Productivity Center. Monitored resources can include fabrics, switches, computers, storage systems, and other storage resource groups.
storage subsystem controller
See node canister.
- A system that provides persistent storage within a network. A storage system can include facilities for host attachment, user role authentication, a command-line interface (CLI), a graphical user interface (GUI), and storage devices that most often include Redundant Array of Independent Disks (RAID) controllers. It might also include agents for enabling third-party management software to monitor or manage the storage devices.
- A generic term for storage in the Content Manager system. See also media archiver, storage class, storage group.
- A device, such as a Redundant Array of Independent Disks (RAID) controller, that creates and manages other storage devices.
- See storage architecture type.
- A user defined code attached to a SKU that is used to differentiate types of SKUs. Storage type can be used to ensure specific types of SKUs are sent to specific warehouse areas for storage.
Hardware that contains one or more drive bays, power supplies, and a network interface. Some storage units contain Redundant Array of Independent Disks (RAID) controllers; in this case, the storage unit is accessed by the appliance.
- In WebSphere Commerce, the place where all transactions for an online business occur. Store types include customer-facing store, asset store, and proxy store.
- To place and retain data in a storage device, so that it is available for retrieval and updating.
store archive (SAR)
A compressed file that contains all the assets (including file assets and database information) necessary to create a store. Publishing the store archive to a WebSphere Commerce Server creates an operational store. See also composite store archive, SAR file format.
See retail controller.
- See procedure.
- A block of procedural constructs and embedded SQL statements that is stored in a database and that can be called by name. Stored procedures allow an application program to be run in two parts, one on the client and the other on the server, so that one call can produce several accesses to the database. See also SPL function, SPL routine, SPL variable.
- A user-written application program that can be invoked through the use of the SQL CALL statement.
Stored Procedure Language (SPL)
An Informix extension to SQL that provides flow-control features such as sequencing, branching, and looping. See also SPL routine.
stored resource definition
The resource information that is stored offline, from which IMS builds runtime resource definitions. Stored resource definitions can reside in system data sets, such as IMS.MODBLKS, IMS.ACBLIB, IMS.FORMAT, and a resource definition data set (RDDS).
stored value card (SVC)
A configurable payment type that represents a card on which funds are available for use. Some examples of SVCs are gift cards, employee cards, pre-paid cards, merchandise return cards, and electronic gift cards.
Any part of an online store that customers see while shopping. Storefront assets include HTML pages, JSP files, style sheets, images, graphics, and other multimedia file types. See also back-office business logic.
storefront asset store
A type of asset store that is a collection of JSP files, commands, business processes (for example, order processing), business policies and access control policies that create a virtual storefront. See also asset store, catalog asset store.
Store Management tool
A Management Center tool that sellers and site administrators can use to manage general store information, change store layout and color, select store functions, select and view a store, open or close a store, and find stores. The Store Management tool in Management Center replaces all of the store management features in WebSphere Commerce Accelerator, except for the store creation and the ability to suspend and resume stores.
In architecture, a mode in which segments are stored for later execution. See also immediate mode.
A process in which changed data is written to the cache structure and to permanent storage simultaneously and under the same serialization; as a result, the data in the cache structure always matches the data in permanent storage
A discharge that is generated when precipitation from rain and snow melt events flows over land or impervious surfaces and does not percolate into the ground. As the runoff flows over the land or impervious surfaces (paved streets, parking lots, and building rooftops), it accumulates debris, chemicals, sediment or other pollutants that could adversely affect water quality if the runoff is discharged untreated.
See straight through processing.
straight through processing (STP)
A series of uninterrupted electronic processes across and throughout an enterprise which (1) secures an initial transaction as an electronic message, (2) transforms and transports it to its initial execution/processing location and (3) passes it through the processing cycle with little, if any, human intervention.
In Metric Studio, a visual representation of the strategy and the objectives of that strategy for an organization. For example, a strategy map may show employees how their jobs are aligned to the overall objectives of the organization.
- Physical channel of communication between a single transmitter and one or more receivers.
- To send data from one device to another.
- An object that specifies configuration rules for a UCM view.
- To unidirectionally transmit multimedia content to a user from a streaming provider.
- A sequence of tuples. See also component, data flow graph, workspace.
- A continuous sequence of data elements being transmitted one character at a time, or intended for transmission, using a defined format.
- In the CVS team programming environment, a shared copy of application resources that is updated by development team members as they make changes. The stream represents the current state of the project.
- A path of connected nodes along which data flows in order to analyze data, make predictions, or both. See also instantiate, node.
- A sequence of data or data items.
- A file access object that allows access to an ordered sequence of characters, as described by the ISO C standard. Such objects can be created by the fdopen() or fopen() functions, and are associated with a file descriptor. A stream provides the additional services of user-selectable buffering and formatted input and output.
- A repository object that includes one or more components. Streams are typically used to integrate the work that is stored in repository workspaces. Team members deliver their changes to the stream and accept changes from other team members into their repository workspaces from the stream.
- A personalized, dynamically and continuously updated list of activities (stories and status updates) that relate to a user, their friends, and profiles that they follow.
- The kernel aggregate created by connecting STREAMS components, resulting from an application of the STREAM mechanism. The primary components are a stream head, a driver, and zero or more pushable modules between the stream head and driver. A stream forms a full duplex processing and data transfer path in the kernel, between a user process and a driver. A stream is analogous to a shell pipeline except that data flow and processing are bidirectional.
- A modifiable configuration of artifacts. For example, team members deliver to the stream when they want to make their changes visible to other team members. See also artifact, baseline, component.
A method of collecting auditing data that writes audit records to a circular buffer within the kernel. The data can be displayed, or printed to provide a paper audit trail, or converted into bin records.
An event processing technology that is designed to simultaneously address two information challenges: the need for much faster information handling and analysis, and the ability to analyze growing volumes of diverse information.
stream data file
Data sets with a byte-oriented structure, which are accessed as continuous streams of data bytes. This structure is common in workstation environments. See also record-oriented file.
Any data sent over a network connection at a specified rate. A stream can be one data type or a combination of types. Data rates, which are expressed in bits per second, vary for different types of streams and networks.
- A file that contains continuous streams of bits such as PC files, documents, and other data stored in System i folders.
- A file containing a continuous stream of data. Stream files are well suited for storing strings of data such as the text of a document, images, audio, and video. The content and format of stream files are managed by the application rather than by the system.
The end of the stream that is closest to the user process and provides an interface between that process and the stream. The principal functions of the stream head are processing STREAMS-related system calls, and bidirectional transfer of data and information between a user process and messages in STREAMS' kernel space.
- In object-oriented programming, the serialization of class information and object instance data.
- A method of writing and reading data on magnetic tape as continuous fields without record boundaries.
- The one-way transmission of multimedia content to a user from a streaming provider. See also 3G, podcast, podcast.
streaming tape device
See streaming tape drive.
- In MFS, the input mode in which fields are defined as a stream of data without record boundaries. See also input mode, record mode.
- A method of sending and receiving data in which records are defined as a stream of data without boundaries.
A kernel mechanism that supports development of network services and data communication drivers. It defines interface standards for character input and output within the kernel, and between the kernel and user level. The STREAMS mechanism comprises integral functions, utility routines, kernel facilities, and a set of structures.
streams processing application
An application that consists of a main composite operator with at least one primitive operator and possibly one or more composite or primitive operators, all of which process streams of data. See also application description language file, composite operator, job, main composite operator, mixed-mode application, primitive operator, Streams Processing Language.
Streams Processing Language (SPL)
A programming language that is used to create streams processing applications. See also streams processing application.
A transaction that becomes durable before it is committed. Strict durability guarantees that data loss does not occur because the transaction must be made durable before the commit occurs. See also durability, relaxed durability.
The relationship between the layout of an array's elements in memory and the order in which those elements are accessed. A stride of 1 means that memory-adjacent array elements are accessed on successive iterations of an array-processing loop. A stride of N means that for each array element accessed, N-1 memory-adjacent elements are skipped over before the next accessed element.
- A field or element that contains one or more printable characters.
- A sequence of elements of the same nature, such as characters considered as a whole. For example, character string, binary string, and hexadecimal string.
- A group of auxiliary storage devices connected in a series on the system. The order and location in which each device is connected to the system determines the physical address of the device.
- A contiguous sequence of bytes terminated by and including the first null byte.
- The value of a character string, graphic string, or binary string data type, consisting of a sequence of bytes that might represent characters.
- In programming languages, the form of data used for storing and manipulating text.
In REXX, an operation that joins two characters or strings in the order specified, forming one string whose length is equal to the sum of the lengths of the two characters or strings.
Zero or more characters enclosed in double quotation marks. See also string literal.
A symbol that is used to enclose a string constant. The SQL string delimiter is the apostrophe (') except in COBOL applications, where the user assigns either a quotation mark (") or an apostrophe (').
- A literal that specifies a column value in a column map or relationship when the corresponding column contains character data.
- Zero or more characters enclosed in double quotation marks. See also string constant.
A built-in function that performs an operation on two strings. See also operator.
In the IBM 3800 Printing Subsystem, a buffer containing 128 scan lines, part of the data to be printed, that accepts input from the character generator while the serializer is removing data.
- The set of tracks located on the set of physical disk drives configured in a Redundant Array of Independent Disks (RAID) logical unit (LU) that have the same parity track. See also striped data set.
- The portion of a striped data set (for example, an extended sequential data set) that resides on one disk. The records in that portion are not necessarily logically consecutive. The system distributes records among the stripes such that the disks can be read or written simultaneously to gain better performance.
- The set of disks comprising the storage assigned to a file system.
- A collection of disks that are grouped together for serving media streams. The multimedia file system uses stripe groups to optimize delivery of multimedia assets.
- A data mapping technique for disk arrays in which fixed-length sequences of virtual-disk data addresses are mapped to sequences of member disk addresses in a regular rotating pattern. See also striped data set.
- A method by which tables are evenly distributed across active disks. Striping prevents overwhelming any one disk with too much data.
- A storage process in which information is split into blocks (a fixed amount of data) and the blocks are written to or read from a series of disks in parallel.
The list of strip characters. See also strip character.
A solution that uses multifactor authentication devices to prevent unauthorized access to confidential corporate information and IT networks, both inside and outside the corporate perimeter.
A dependency that causes an object to be recompiled when another object that it depends on, such as a table or a data type, is dropped or modified. See also weak dependency.
An export that allows only one definition of an external symbol to be used by the binder. The first definition in the binder search is chosen, and duplicate definitions are discarded. The binder always chooses a strong export over a weak export for the same symbol. See also weak export.
strongly typed cursor data type
A cursor data type that is associated with a row data type. A variable or parameter of a strongly typed cursor data type can reference only a result set with the same definition as the row data structure. See also weakly typed cursor data type.
A process that prevents two objects with mismatched data types from being compared to each other and prevents data from being assigned to an object defined to accept data of a different type. See also implicit casting, weak typing.
- An aggregate of elements having arbitrary types.
- See structure.
See structure tag.
structural data source
A data source that defines the structure of a Transformer model. It contains columns that map to levels and categories to build dimensions in the model. See also transactional data source.
- A series of elements that have been graded or ranked in some useful manner. In WebSphere Business Modeler, a graphical representation of the relationships between different real entities in an organization.
- A relationship that describes how accounts, companies, forms or extended dimensions are connected.
- A construct that uses z/OS to map and manage storage on a coupling facility.
- A name that refers collectively to different types of DB2 objects, such as tables, databases, views, indexes, and table spaces.
- A class data type that contains an ordered group of data objects. Unlike an array, the data objects within a structure can have varied data types.
Semi-static data that is used to provide context for other data within a relational database and is typically used to construct a reference structure. For example, a product master contains a list of products with which the company deals. The product master may also contain supporting information, such as product characteristics.
- A self-identifying string of bytes and its data or parameters.
- Output from the DFSMSrmm application programming interface (API) consisting of a structured field introducer (SFI) and output data.
- A mechanism that permits variable length data to be encoded for transmission in the data stream.
An INed file that contains specialized data, such as information about the structure of the data in the file, and history information about changes that have been made to the file. Structured files can contain hierarchical data that is displayed and edited by using forms.
Structured Query Language injection (SQL injection)
An attack technique used to exploit websites by altering back-end SQL statements through manipulating application input. See also Structured Query Language.
The tabular aspect of the Design view of the XML editor that separates the structural constituents of an XML document, such as elements and attribute types, from values, such as attribute values and textual content.
In relation to group buffer pools, the DB2 member that is responsible for the following activities: coordinating rebuild, checkpoint, and damage assessment processing; and monitoring the group buffer pool threshold and notifying castout owners when the threshold has been reached
See set and test sequence number.
- The two types of Remote Procedure Calls (RPCs) that are produced by the compiler when an interface is defined. The application code calls the stub, and the RPC mechanism translates this into a call to the appropriate function on the remote machine.
- A line in a state table that is only partially displayed.
- A shortcut on the Windows file system that is generated by the hierarchical storage management (HSM) client for a migrated file that allows transparent user access. A stub is the sparse file representation of a migrated file, with a reparse point attached.
- A program module that transfers remote procedure calls (RPCs) and responses between a client and a server. Stubs perform marshalling, unmarshalling, and data format conversion. Both clients and servers have stubs. The Network Interface Definition Language (NIDL) compiler generates client and server stub code from an interface definition.
- In email archiving, an email document from which previously archived content has been removed. The stub usually contains links to the archived content, that is, to the attachments and the body text of the email. Clicking these links, users can view, and, in a second step, restore the content to its original location.
- A small program routine that substitutes for a longer, possibly remote, program. For example, a stub might be a program module that transfers procedure calls (RPCs) and responses between a client and a server. In web services, a stub is an implementation of a Java interface generated from a Web Services Description Language (WSDL) document.
- A small module, link-edited into application code, that locates and transfers control to a larger body of related code.
- To reduce the space that user mailboxes occupy on email servers.
- A component containing functionality for testing purposes. A stub is either a pure "dummy", just returning some predefined values, or it is "simulating" a more complex behavior.
- A replica or Notes database copy that has not yet been filled with documents. The database is no longer a stub after the first replication takes place.
- A protocol extension procedure that connects with the library but remains outside the library.
- In the Enhanced X-Windows Toolkit, the hooking functions that are used as extensions to the protocol to generate protocol requests.
A file that replaces the original file on a local file system when the file is migrated to storage. A stub file contains the information that is necessary to recall a migrated file from server storage. It also contains additional information that can be used to eliminate the need to recall a migrated file. See also migrated file, resident file.
stub file size
The size of a file that replaces the original file on a local file system when the file is migrated to server storage. The size that is specified for stub files determines how much leader data can be stored in the stub file. The default for stub file size is the block size defined for a file system minus 1 byte.
See start-of-text character.
In CDE, the software application used to customize some of the visual elements and system device behaviors of the workspace environment, including colors and fonts, and keyboard, mouse, window, and session start-up behaviors.
A specification of formatting instructions that, when applied to structured information, provides a particular rendering of that information (for example, online or printed). Different style sheets can be applied to the same piece of structured information to produce different presentations of the information.
See child item.
- In X.25 communications, the unallocated digits at the end of the national terminal number (NTN). If the network provider allocates all digits to the NTN, there can be no subaddress.
- An extension of an ISDN address used to identify individual users, processors, or groups of users within a large group of users or processors that are identified by a single network number.
- A logical grouping of bundles and services on the common agent. An application uses a subagent to perform actions on a system where the common agent is installed. See also agent, bundle, common agent.
- An extension to an SNMP agent that permits a user to dynamically add, or in some cases replace, management variables in the local MIB, thereby providing a means of extending the range of information that network managers may access.
- An agent that the coordinator agent enlists to speed up SQL processing. See also coordinating agent.
A request issued by a coordinator agent to a subagent at the same or a different database partition. See also request.
An alternative name that is used when several names are required for an object. For example, a single multiple response variable translates into a number of separate variables in SPSS .sav format. The subaliases are the names that are given to the variables in the SPSS .sav file.
A Virtual Storage Access Method (VSAM) file occupying a portion of a data space that is already defined. The data space may contain other files. See also unique file.
- An area that is nested within another area.
- A portion of the SNA network consisting of a subarea node, attached peripheral nodes, and associated resources. Within a subarea node, all network addressable units (NAUs), links, and adjacent link stations in attached peripheral or subarea nodes that are addressable within the subarea share a common subarea address and have distinct element addresses. See also adjacent subarea, element.
In SNA, a value in the subarea field of the network address that identifies a specific subarea. See also element address.
In SNA, a link that connects two subarea nodes. See also channel link.
subarea node (SN)
In SNA, a type 4 or type 5 node that uses network addresses for routing and whose routing tables are, therefore, affected by changes in the configuration of the network. Subarea nodes can provide boundary function support for peripheral nodes.
Pertains to a software licensing scheme that bases charges on the capacity of the partition where the licensed program is used, rather than on the total capacity in the server. See also full-capacity, partition, processor value unit, virtualization, virtualization.
In a partitioned operating environment, a software license that bases charges on the capacity of the partition where the licensed program is used, rather than on the total capacity in the server.
- In Java, a class that is derived from a particular class, through inheritance.
- A Workload manager class that is given resource entitlements relative to the entitlements of its associated superclass.
- In a generalization relationship, the specialization of another class; the superclass.
A tree of categories with levels that are independent of levels in the dimension. A subdimension can provide different details, or different levels of detail, for categories in a level. Subdimensions are permitted in dimensions with only one drill-down path or, in an alternate drill-down structure, at or below the convergence level.
In UN/EDIFACT EDI standards, an EDI data element that is part of an EDI composite data element. For example, an EDI data element and its qualifier are subelements of an EDI composite data element.
A list of the sub-events of a particular composite event that have fired. Each composite event has a sub-event queue associated with it. The queue may be empty. Sub-events remain on the sub-event queue until they are retrieved, or until a syncpoint occurs.
- In RPG, the layout of a field within a data structure.
- A subdivision of a field with a specific meaning. For example, the SWIFT field 32 has the subfields date, currency code, and amount. A field can have several subfield layouts depending on the way the field is used in a particular message.
In IBM i, a group of records of the same record format that can be displayed at the same time at a display station. The system sends the entire group of records to the display in a single operation and receives the group from the display in another operation.
subfile control record format
One of two record formats required to define a subfile in DDS. The subfile control record format describes the size of the subfile and the size of the subfile page, and is used by the program to write the subfile to and read the subfile from the display.
subfile record format
One of two record formats required to define a subfile in DDS. The subfile record format defines the fields in a subfile record and is used by the program to perform input, output, and update operations to the subfile.
A sequence of processing steps, implemented using message flow nodes, that is designed to be embedded in a message flow or in another subflow. A subflow must include at least one Input or Output node. A subflow can be executed by a broker only as part of the message flow in which it is embedded, and therefore it cannot be deployed. See also message flow.
A message flow node that represents a subflow. See also primitive.
- A folder that is in another folder. For example, if folder A contains folder B and folder B contains folder C, then B and C are subfolders of A because the folder path for each begins with A (A/B/C).
- In CDE, a folder contained within another folder. When discussing command-line activities, this may be called a subdirectory.
A form-building shortcut that lets designers store regularly used fields, sections, actions, and other form elements together. Subforms can be placed on a form either permanently or as computed subforms that display on documents as dictated by a formula.
- A data flow graph for a composite operator that is reused by streams processing applications. See also composite operator, data flow graph.
- A graph that is contained in another graph. In flat graphs, G' is a subgraph of G if its node and link sets are included in the node and link sets of G. In nested graphs, a node that is a graph is called a subgraph of the nested graph.
- A set of modifications within a copy group that applies to a certain number of copies of a form. A copy group can contain more than one subgroup.
- The name of a company type group that is connected to another group.
- A group that is subordinate to another group. A subgroup corresponds to a nested looping structure, a loop within a loop.
submit/release data set
A data set shared between the Tivoli Workload Scheduler for z/OS host and a local Tivoli Workload Scheduler for z/OS processor that is used to send job-stream data and job-release commands from the host to the local processor.
For internet subnetworking, a 32-bit mask used to identify the subnetwork address bits in the host portion of an IP address. See also address mask.
- A network that is divided into smaller independent subgroups, which still are interconnected.
- The communications media that join two network nodes together. A subnetwork is a representation within the OSI reference model of a real network, such as a carrier network, a private network, or a local area network (LAN).
- A grouping of connected traffic links that is defined by the user. This grouping is to improve application performance.
- A network that forms part of a larger network but can be represented as a single object.
- A distinct partitioned piece of an internet network represented by two or more sets of addresses that are subsets of the network's range of addresses.
- To divide a network into smaller interconnected, but independent subgroups.
subnetwork access protocol (SNAP)
In LANs, a 5-byte protocol discriminator that identifies the non-IEEE standard protocol family to which a packet belongs. The SNAP value is used to differentiate between protocols that use $AA as their service access point (SAP) value.
A bit mask of 32 bits that defines the particular subnetwork to which an interface attaches. See also address mask.
In floating-point representation, any nonzero number that is smaller than the smallest normal number. A subnormal number has zero as the leftmost digit of the significand. See also decimal floating-point number, normal number.
An object that is created during the application of a declaration in a CSS style sheet, by virtue of a declaration value of the form @#identifier, @=identifier, or @+identifier. It is styled through the same CSS style sheet, although it is not contained in the original CSS model.
One of multiple elements in a list that comprises an operand. See also definition statement.
- A system in which a child unit of recovery (UR) of a multisystem cascaded transaction resides.
- In two-phase commit processing, a recovery manager that must wait for confirmation from its coordinator before committing or backing out changes made to recoverable resources by its part of a distributed unit of work. The subordinate can be in doubt in respect to its coordinator. See also coordinator.
- A part of a logical page on which traditional line data can be placed. In the page definition, multiple subpages can be placed on a physical page as specified in the print data.
- The unit into which a physical index page can be divided.
An access point for data entry or exit over a logical connection. The relationship between the physical line and the port is analogous to the relationship between the logical connection and the subport. See also frame handler subport.
- An independent process that is part of another business process.
- A local process that is also a part of another process. See also deployment manager.
- A process initiated by another process. Control is transferred back to the main process after the subprocess finishes running.
- A program that is called by another program, such as a subshell. See also main program.
- In Ada language, a program unit that can be either a procedure or a function. A subprogram includes: a) a declaration, which specifies its name, formal parameters, and (for a function) its result; and b) a body, which specifies the sequence of actions.
- In the IPA Link version of the Inline Report listing section, an equivalent term for 'function'.
- A called program that is combined with the calling program at run time to produce a run unit. A subprogram is below the calling program in the call stack.
- In FORTRAN, a program unit that has a FUNCTION, SUBROUTINE, or BLOCK DATA statement as its first statement.
- In SQL, a subselect used within a predicate, for example, a select-statement within the WHERE or HAVING clause of another SQL statement.
- A select expression that is enclosed in parentheses as a nested query block in a query statement.
- A form of a fullselect that is enclosed within parentheses and used as a component of a query.
A set of resource names and rules for the construction of resource names. Tivoli Workload Scheduler for z/OS uses these names when checking a user's authority to access individual Tivoli Workload Scheduler for z/OS data records.
- A sequence of instructions within a larger program that performs a particular task. A subroutine can be accessed repeatedly, can be used in more than one program, and can be called at more than one point in a program.
- In REXX, an internal, built-in, or external routine called by the CALL instruction that may or may not return a result string. If a subroutine returns a result string, a subroutine can also be called by a function call, in which case it is being called as a function.
- To request information about a topic.
- To register to access data that is published by another application or system. See also publish.
- In SQL replication, to enable tables or views registered as replication targets to receive initial source data and subsequent changes from tables or views registered as replication sources.
- To register to access the mastered data from Emptoris Strategic Supply platform.
- A person who is registered to receive email notifications of events.
- In voice mail, any person who owns a mailbox.
- The consumer of a business service.
- A publish/subscribe application that requests information about a topic.
A named set of variables used to define a specific level of service available to telephone subscribers, such as maximum number of messages per mailbox and maximum number of members per mailbox distribution list.
subscriber identity module (SIM)
A smart card inserted into GSM phones that contains the user's telephone account information, and that allows the user to use a borrowed or rented GSM phone as if it were his or her own.
Subscriber Identity Module card (SIM card)
A portable memory card that contains the user's subscription information, personal data, and contact list. SIM cards are exclusive to GSM (or GSM compatible) networks and are supported around the world. See also Global System for Mobile Communications, phone locking.
- An integer or variable whose value selects a particular element in a table or array.
- In COBOL, a positive number or variable whose value refers to a particular item in a table.
- A character that is printed one-half line below the normal printing line. For example, the number 2 in the chemical formula for water, H 2 O, is a subscript. See also superscript.
- One or more expressions, each enclosed in brackets, that follow an array name. A subscript refers to an element in an array.
- Email notices and Really Simple Syndication (RSS) feeds that repository users create to receive when the state of an asset changes.
- In SQL replication, an object that creates subscription sets and subscription-set members. See also Q subscription, registration, subscription set.
- A schedule of reports to be executed or delivered to a distribution list.
- A request made to an owner center for data to be sent periodically to an external center.
- A record that contains the information that a subscriber passes to a local broker or server to describe the publications that it wants to receive.
- The process of exporting a subset of master data or a set of profiles to stores.
- In a storage environment, the process of identifying the subscribers to which the profiles are distributed. See also enterprise configuration, managed server.
- The set of mappings between source replication objects and target replication objects.
- A method that sets up the conditions required for an event action to take place and the class, object, instance or workflow that event acts upon.
- An order that allows continuous access to a service or a product for a specified period of time. For example, a monthly magazine can be ordered for one year for $20, or two years for $35.
The process in which the Apply program retrieves changed data for a given subscription set, replicates the changes to the target table, and updates the appropriate replication control tables to reflect its status and current progress.
In SQL replication, a definition that controls the replication of changed data during a subscription cycle. A subscription set can contain zero or more subscription-set members. See also replication source, subscription.
In SQL replication, a definition that maps a registered replication source to a replication target. Each member defines the structure of the target table and the rows and columns that are replicated from the source table. See also replication source.
- A set of elements from within another set.
- A set of elements within a dimension. Subsets may be named and saved for future use.
- A variant form of a programming language with fewer features or more restrictions than the original language.
- A named collection of companies.
- To replicate data from part of a source table, rather than from the entire table, to a target table. Data can be subset by rows or by columns.
subset character set
A set of characters that is completely contained in another larger set of characters. See also full character set.
In architecture, within the base-and-towers concept, a tower representing an aspect of function achieved by an architecture. A tower is independent of any other towers. A tower can be subdivided into subsets. A subset contains all the function of any subsets below it in the tower
A group of subspaces and a single base space, where the base space is the normal MVS address space. See also subspace group facility.
subspace group facility
A facility in MVS that can be used for storage isolation to preserve data integrity within an address space. See also subspace group.
An XML Schema feature that provides a means of substituting one element for another in an XML message. A substitution group contains a list of global elements that can appear in place of another global element, called the head element.
In UML modeling, a dependency relationship in which the client model element takes the place of the supplier model element. See also dependency relationship.
- A variable with a user-specified value that is used to perform a one-off replacement wherever a substitution is required. Even if the value of the variable changes throughout the process, this is not reflected in the substitution variable. See also variable scope.
- A variable in a form whose value is specified by a global variable.
- A variable in a procedure or query whose value is specified either by a global variable or by a runtime variable.
- A variable that can be used to specify column selection criteria or to create an SQL WHERE Clause.
- A variable used to pass information, such as a file name, for use in a message.
- In a microcircuit, the supporting material upon which or within which an integrated circuit is fabricated, or to which in integrated circuit is attached.
- In bar codes, the surface on which a bar code symbol is printed.
- The molded plastic portion of a videodisc or compact disc.
- In the Remote System Explorer, a container for a particular user's remote IBM i libraries, command sets, and jobs.
- A secondary or subordinate system, usually capable of operating independently of, or asynchronously with, a controlling system.
- The part of communications that handles the requirements of the remote system, isolating most system-dependent considerations from the application program.
- An operating environment, defined by a subsystem description, where the system coordinates processing and resources.
- In z/OS, a service provider that performs one or many functions but does nothing until a request is made. For example, each WebSphere MQ for z/OS queue manager or instance of a DB2 for z/OS database management system is a z/OS subsystem.
A system object that contains information defining the characteristics of an operating environment controlled by the system. The system-recognized identifier for the object type is *SBSD.
- A number that uniquely identifies a logical subsystem (LSS) within a computer installation.
- A user-assigned number that identifies a direct access storage device (DASD) subsystem. This number is set by the service representative at the time of installation and is included in the vital product data (VPD).
subsystem information base
In OSI, an information base that specifies configuration information. The subsystem information base is built mostly by the Administrative Facility and used by OSI Communications Subsystem to control its own operations and network operations.
subsystem support services (SSS)
A set of IBM-supplied programs, executed in the host system, that provide services for subsystems such as creating and updating subsystem libraries at the host system, processing programs and data to be used by the subsystems, and transmitting the programs and data to communication controllers and program-controlled terminals.
- A branch of a type tree that includes a type and all of the subtypes that stem underneath it.
- A lower-level directory structure.
- A tree structure created by arbitrarily denoting a node to be the root node in a tree. A subtree is always part of a whole tree. See also forest of trees index.
- A section of a directory tree. The subtree typically starts at a particular directory and includes all subdirectories and objects below that directory in the directory hierarchy; that is, any subdirectories or objects connected to the directory or to any lower level of its subdirectories.
- A type that extends or implements another type; the supertype.
- In Ada language, a subset of the values of a type that is determined by a constraint on the type. Each value in the set of values of a subtype belongs to the subtype and satisfies the constraint determining the subtype.
- A named row data type that inherits all representation (data fields) and behavior (routines) from a supertype above it in the type hierarchy and can add additional fields and routines. The number of fields in a subtype is always greater than or equal to the number of fields in its supertype.
A job that cannot start until all of the predecessor jobs or job streams on which it is dependent are completed successfully. See also predecessor.
- A character string attached to the end of a file name that helps identify its file type.
- A code dialed by a caller who is already engaged in a call.
- A distinguished name that identifies the top entry in a locally held directory hierarchy. Because of the relative naming scheme used in Lightweight Directory Access Protocol (LDAP), this suffix applies to every other entry within that directory hierarchy. A directory server can have multiple suffixes, each identifying a locally held directory hierarchy.
- An affix that appears at the end of a name. For example, the affix "eddin" in "Nur-eddin" is a suffix.
- The process of aggregating events and then submitting the set of events with a much smaller number of summary events.
- The process of including non-redundant sentences in search results to briefly describe the content of a document. See also dynamic summarization, static summarization.
In reporting and analysis, an aggregate value that is calculated for all the values of a particular level or dimension. Examples of summaries include total, minimum, maximum, average, and count.
Information about the response times and volume history, as well as total times and counts of successful transactions for the whole application See also data interval.
A partition that contains pre-summarized values for the categories in higher levels of one or more dimensions. Information requests that can be satisfied from the summary partition use the pre-summarized values and, therefore, require less calculation at the time of the request.
- In Query, a report that contains only summary information, such as the total, average, minimum, maximum, or count by a query. See also detail report.
- A statistics report produced by the CICS statistics utility program (STUP). It summarizes the interval, unsolicited, requested reset, and end-of-day statistics on an applid by applid basis. See also statistics utility program.
A materialized query table whose fullselect contains a GROUP BY clause that summarizes data from the tables referenced in the fullselect. See also materialized query table.
- A task that comprises a series of subtasks.
- A container element that comprises a series of tasks.
See daylight saving time.
A user who has full access to the entire Presence Zones system and is responsible for the system administration and user management. This user is the key administrator who sets up the system and creates and manages users, and creates and deploys sites.
super asynchronous mode
In high availability disaster recovery, the synchronization mode in which the primary database considers a transaction committed when the transaction is successfully written to the disk of the primary system. The primary database does not wait for an acknowledgment that the log data was sent to the standby system. See also high availability disaster recovery, peer state, synchronization mode.
- In Java, a class from which a particular class is inherited, perhaps with one or more classes in between.
- See parent class.
- In AIXwindows and Enhanced X-Windows, a class of widgets that passes inheritable resources down the hierarchy to a lower subclass.
A computer that leads the world in processing capacity and speed of calculation when it is introduced. See also Watson.
A bit template that identifies to the TCP/IP code which bits of the host address are used for routing to specific subnets. A subnet mask has fewer 1 bits than the corresponding class mask for a given Internet Protocol (IP) address.
A symbol, number, or letter written immediately above and to the right or left of another character. For example, a footnote can be identified in text with a superscript number. See also subscript.
- All the interfaces and classes that are extended or implemented by that type.
- In a type hierarchy, a type that subtypes inherit attributes from.
- A named row data type whose representation (data fields) and behavior (routines) is inherited by a subtype below it in the type hierarchy.
- A user who has various system control authorities above and beyond that of the ordinary user. In UNIX environments, the standard superuser is root.
- See root user.
- The unrestricted ability to access and modify any part of the operating system, usually associated with the user who manages the system.
- See root user authority.
A combination of two or more versions of the metadata. The versions are combined to form a superset, although when there is a conflict between, for example, a text in one or more of the versions, the more recent versions generally take precedence over the older versions.
- A request that serves as the interface into operating system functions, such as allocating storage. The SVC protects the operating system from inappropriate user entry. All operating system requests must be handled by SVCs.
- An instruction that interrupts the program being run and passes control to the supervisor so that it can perform the specific service indicated by the instruction.
A state during which a processing unit can execute input/output and other privileged instructions. See also problem state.
Pertaining to a frame format that performs data link control functions such as acknowledging information frames, requesting retransmission, and requesting temporary suspension of transmission. Receive ready (RR), receive not ready (RNR), and reject (REJ) are examples of supervisory frame formats.
A routine, usually part of an operating system, that controls the execution of other routines and regulates the flow of work in a data processing system. See also supervisor.
One or more group profiles of which the user is a member. The user's first group profile is specified in the group profile (GRPPRF) parameter of the user profile. Supplemental group profiles are specified in the supplemental group profile (SUPGRPPRF) parameter of the group profile.
In Euro-ISDN, a service outside the minimum service offering that each signatory is obliged to provide. For example, calling line identification presentation (CLIP) and call session.
- A provider of products, services, or both to a customer.
- A manufacturer or other company that provides goods to the shipper.
supplier cost constraint
The excess cost incurred when doing business with certain suppliers. This cost gets added to the bids, and the awarding suggestions are made by taking into account the excess cost.
For directory shadowing, a system that provides initial or changed Enterprise Address Book (EAB) data to a collector system in a network. See also collector system.
supply and demand analysis
A graphic space capacity fit or gap analysis to develop portfolio plans that efficiently use space across time. The analysis compares demand to the supply across time to determine if business needs match the space or portfolio inventory.
supply chain security
The protection of products, facilities, equipment, information, and personnel from theft, damage, or terrorism and the prevention of the introduction of unauthorized material, people, or weapons of mass destruction/effect into the supply chain.
- In system development, to provide the necessary resources for the correct operation of a functional unit.
- In system development, to provide the necessary resources for the correct operation of a functional unit.
See IBM Support Assistant.
An additional optional document that a company chooses to submit along with the mandatory content. See also exhibit.
- Text that can be specified for suppression. To suppress text, the suppression name must be specified in a copy group in the form definition. See also text suppression.
- Text that is to be ignored in certain copy operations.
- In architecture, a method used to prevent presentation of specified data. Examples of suppression are the processing of text data without placing characters on a physical medium and the electronic equivalent of the spot carbon, which prevents selected data from being presented on certain copies of a presentation space or a physical medium.
- In AFP support, a page-and-form-definition function that is used to identify fields in a print record that are not printed on selected pages of a document.
suppression local ID
A value assigned in the Map Suppression coded field to a suppression named in a Line Descriptor (LND) or Record Descriptor (RCD) structured field. This value is contained in the Begin and End Suppression text controls.
A customization option that restricts access to selected information in the cube by concealing a category within a dimension view. Within any cube that includes the view, the immediate descendants of the suppressed category link directly to its immediate ancestor category. In the cube, users see only the immediate ancestors and immediate descendants of the suppressed category.
See surrogate identifier.
surrogate identifier (surrogate ID)
An artificial identifier used to replace the natural member identifier of a dimension. Whereas the natural member identifier may be text-based, the surrogate identifier is always an integer. Natural member identifiers may have meaning, such as a product code, however, surrogate identifiers do not.
- See surrogate identifier.
- An artificially created unique identifier column for rows in those tables that have no such natural key column.
A coded representation for a single character that consists of a sequence of two 16-bit code units, in which the first value of the pair is a high-surrogate code unit in the range U+D800 through U+DBFF, and the second value is a low-surrogate code unit in the range U+DC00 through U+DFFF. Surrogate pairs provide an extension mechanism for encoding an additional 1,048,576 characters without using any 32-bit code units.
In CICS transaction routing, a TCTTE in the transaction-owning region that is used to represent the terminal that invoked, or was acquired by, the transaction. See also surrogate terminal.
A terminal whose terminal definition is shipped from a terminal owning region (TOR). See also surrogate TCTTE.
suspect relationship state
A state applied to a traceability or hierarchical relationship when a change occurs to one or both of the requirements in the relationship. A suspect relationship state indicates that, because of the modification to one or both requirements, the relationship may require modification as well. See also change-managed relationship, traceability matrix.
- In cross-site mirroring, to temporarily stop geographic mirroring. If the mirror copy contained usable data when suspended, the mirror copy still contains usable, though possibly outdated, data.
- To temporarily remove a change set from a repository workspace.
- To remove an object from its workflow and define the suspension criteria needed to activate it. Later activating the object enables it to continue processing.
- To pause a process instance.
Pertaining to a case-level status that is used to classify an interview that has not yet had all of the respondents’ answers entered as data. This status differs from the concept of the survey itself being incomplete in terms of the volume of responses or responses to specific questions.
- A state in which the resource is temporarily not receiving a request. A start action request returns the resource to the state it was in prior to being suspended.
- A state in which only one of the devices in a dual-copy or remote-copy volume pair is being updated as a result of a permanent error condition or an authorized user command. All writes to the remaining functional device are logged. Suspended state allows for automatic resynchronization of both volumes when the volume pair is reset to the active duplex state.
- In cross-site mirroring, the configuration state of the mirror copy that does not attempt to perform geographic mirroring when the independent disk pool is available. The mirror copy state is suspended when it is not resuming or active.
A profile that identifies a set of link types, artifact types, and attributes to watch for changes. When artifacts that match the profile criteria are changed, the linked artifacts are marked with a suspicion indicator.
sustainable cell rate (SCR)
The maximum average rate at which an asynchronous transfer mode (ATM) endsystem can transmit cells into the network. The "on" and "off" cycles of transmission are averaged to determine the sustainable cell rate. See also maximum burst size, peak cell rate.
See system under test.
See schedule variance.
See shared virtual area.
See service bundle.
- See switched virtual circuit.
- See stored value card.
- See switched virtual channel.
- See supervisor call.
See Scalable Vector Graphics.
See scheduler work area.
- In a system with virtual storage, to write the main storage image of a job to auxiliary storage and read the image of another job into processor storage.
- A disk partition that is used for the temporary storage of entities too large to fit in random access memory (RAM).
- See paging.
- A process that interchanges the contents of an area of real storage with the contents of an area in auxiliary storage.
See bank identifier code.
SWIFT input message
A SWIFT message with an input header to be sent to the SWIFT network. See also SWIFT output message.
A SWIFT service providing FIN access using the Secure IP Network (SIPN) instead of the SWIFT Transport Network (STN). See also FIN.
See SWIFTNet public key infrastructure.
SWIFTNet public key infrastructure (SWIFTNet PKI)
SWIFT's mandatory security software and hardware installed with SWIFTNet Link. See also public key infrastructure.
SWIFTNet service application
An application that uses SWIFTNet services. Financial organizations such as Continuous Linked Settlement (CLS) or the Global Straight Through Processing Association (GSTPA) offer such applications to financial institutions.
SWIFT output message
A SWIFT message with an output header coming from the SWIFT network. See also SWIFT input message.
- See pool.
- A visually separated row within a process flow diagram that groups all the activities in the process that are performed by a particular combination of roles, resources, organization units, or locations.
A collection of GUI components that runs consistently on any operating system that supports the Java virtual machine (JVM). Because they are written entirely in the Java programming language, these components provide functionality above and beyond that provided by native-platform equivalents. See also Abstract Window Toolkit, Standard Widget Toolkit.
To rapidly move your finger horizontally or vertically on a touchscreen. Typically, apps use swipe gestures to switch between menus. See also gesture.
- A half-duplex or full-duplex device that detects which devices are attached at each port and passes only frames addressed to those devices on that port. A switch has a small collision domain.
- A device that provides connections between telephone lines and trunks.
- A network infrastructure component to which multiple nodes attach. Unlike a hub, a switch typically has internal bandwidth that is a multiple of link bandwidth and the ability to rapidly switch a node connection from one to another. A typical switch can accommodate several simultaneous full-link bandwidth transmissions between different pairs of nodes.
- A command-line option.
The physical resource containing the independent disk pools that can be switched between systems in a cluster. This can be a expansion unit containing disk units in a multiple system environment. This could also be an IOP containing disk units in an LPAR environment. See also device cluster resource group.
switchable hardware group
See device cluster resource group.
In a remote journal network, pertaining to the processing that is performed by a hot-backup application to allow the primary system to reassume its role from a previously promoted backup system.
- A mode of operating a data link in which a circuit or channel is established to switching facilities as, for example, in a public switched network.
- A connection that is established by dialing. See also nonswitched connection.
- The physical or logical mapping of the location of networking components or nodes within a network. Common network topologies include bus, ring, star, and tree.
- A Fibre Channel topology that provides the underlying structure to interconnect multiple nodes and provides the necessary switching functions to support communication among multiple nodes. See also arbitrated loop, point-to-point.
In data communications, a connection between computers or devices that is established by dialing. See also nonswitched line.
switched network backup (SNBU)
A modem feature that allows a nonswitched line to be used alternatively as a switched line or allows a switched line to be used as a nonswitched line depending on the characteristics of the modem.
switched virtual channel (SVC)
In asynchronous transfer mode (ATM), a temporary connection between two users that is established when one user calls another. Although this is similar in concept to one person's calling another person on the telephone, the signaling techniques are different. See also permanent virtual channel.
- In OSI, a temporary association between two DTEs that is initiated when one DTE makes a call request to the network.
- A virtual circuit that is requested by a virtual call. It is released when the virtual circuit is cleared.
switching fabric interface
An internal interface that is responsible for network connectivity among all SPUs and the host computer. The SFI monitors and reports the status of all SPU cards, power supplies, and fans.
The BladeCenter component that provides network connectivity for the BladeCenter chassis and blade servers. It also provides interconnectivity between the management module and blade servers.
- The change from the active multi-instance queue manager instance to a standby instance. A switchover results from an operator intentionally stopping the active multi-instance queue manager instance.
- In a remote journal network, pertaining to the processing that is performed by a hot-backup application to logically promote a backup system to assume the role of a primary system.
- A cluster event where the primary database server or application server switches over to a backup system due to the manual intervention from the cluster management interface.
In WebSphere MQ for z/OS, a RACF profile used when WebSphere MQ starts up or when a refresh security command is issued. Each switch profile that WebSphere MQ detects turns off checking for the specified resource.
See short wavelength.
See Standard Widget Toolkit.
- A hyphen used to divide a word at the end of a line; it may be removed when a program adjusts lines. See also required hyphen.
- See soft hyphen.
A shared source, proprietary mobile operating system that is currently maintained by Accenture. At the height of its popularity, Symbian OS was used primarily by Nokia and Sony. See also mobile operating system.
- Any combination of alphabetic or numeric characters (A-Z, a-z, or 0-9) and the characters @, #, $, ., !, ?, and _.
- In MVS, a group of 1 - 8 characters, including alphanumeric characters and the three characters: #, @, $. The symbol begins with either an alphabetic character or one of the three characters (#,@,$).
- A string of characters that represent a finanical instrument and might also identify where the instrument is traded. One instrument can be represented by different strings in different symbologies. See also order book.
- A representation of something by reason of relationship, association, or convention. (A)
- A collection of graphic objects, parameters and conditions that are used to give a dynamic representation of changing data. It is made up of objects and other symbols.
- A graphic representation of a concept that has meaning in a specific context. (T)
A checkpoint in a batch, BMP, or JBP application that indicates to IMS that the program has reached a commit point and that establishes a place in the program from which the application can be restarted. See also extended restart.
A tool that aids in the debugging of programs written in certain high-level languages. See also source debugger.
symbolic destination name
In the OSI Communications Subsystem licensed program, a name by which an application entity identifies to OSI Communications Subsystem the peer application entity with which it is to communicate. OSI Communications Subsystem uses the symbolic destination name to determine (a) the presentation address of the peer application entity, and (b) the application mode to be used on the association.
symbolic feedback code
The symbolic representation of the first 8 bytes of the 12-byte condition token. In a condition handling routine, a symbolic feedback code is substituted for the hexadecimal coding of the condition token.
- A unique name used to identify an entity such as a field, file, data structure, or label within an RPG program.
- A string composed of characters from the ISO 646 code set that is used in locales to represent a character.
In ILE, the process the binder uses to match unresolved imports from the set of modules to be bound by copy with the set of exports provided by the specified modules and service programs.
- In Business Graphics Utility, a supplied character set used for text strings on charts; for example, headings, legend text, labels, and notes.
- In PSF, a type of font that resides in a printer but has fewer attributes than can be specified for resident coded fonts.
- In architecture, a coded font that is usually simpler in structure than a fully described font. Symbol sets are used where typographic quality is not required. Examples of devices that might not provide typographic quality are dot-matrix printers and displays. See also marker set, pattern set.
In DCF, during formatting, the replacement of a symbol with a character string that SCRIPT/VS can interpret as a value (numeric, character string, or control word) or as another symbol.
An algorithm where the encryption key can be calculated from the decryption key and vice versa. In most symmetric algorithms, the encryption key and the decryption key are the same.
A network in which all the initiators are connected at the same level and all the controllers are connected at the same level. See also oversubscription.
See shared-secret key cryptography.
A common key and mathematical algorithm used to both encrypt and decrypt a message. For two people to communicate securely with each other, both need to agree on the same mathematical algorithm to use for encrypting and decrypting data. They also need to have a common key: the secret key. Symmetric encryption is also referred to as secret key encryption.
A code that is used by sending and receiving systems to encrypt the data that they are exchanging. Both systems have the same key for encryption to work. In the storage system, the data is encrypted once with a symmetric key and then again with another symmetric key, the key encryption key. The key encription key is managed by the identity component of the product.
symmetric key cryptography
A system of cryptography in which the sender and receiver of a message share a single, common, secret key that is used to encrypt and decrypt the message. See also asymmetric key cryptography.
A virtualization technique in which the physical storage, in the form of a Redundant Array of Independent Disks (RAID), is split into smaller chunks of storage known as extents. These extents are then concatenated, using various policies, to make volumes. See also asymmetric virtualization.
An XML file of symptoms including one or more string match patterns with one or more associated solutions that is used in the analysis of event and error messages that occur in an activity log.
- A structured character string written to a file when VTAM detects certain error conditions.
- Diagnostic information displayed in a structured format designed for searching the IBM software support database.
See synchronization character.
See synchronization character.
In SQL replication, a control table value for the sequence number in the DB2 log or journal record corresponding to the last change that was applied during the most recent Apply cycle. This value is also used to coordinate the pruning of CD tables. See also change-data table.
- The process of publishing and updating changes in a rule to a server.
- A bi-directional process of copying data updates and metadata from an original cube to its replicated versions, and from replicated versions of the cube back to the original cube.
- The cross-site mirroring (XSM) processing that copies data from the production copy to the mirror copy.
- A coordinated commitment control process between communicating transactions that ensures that all logically-related updates to recoverable resources are completed or that all are backed out.
- The process by which a satellite downloads and runs the same DB2 database commands, operating system commands, and SQL statements from the satellite control server as the other members of its group download and then reports the results to the satellite control server.
- The process of coordinating system data component content in order to maintain consistency.
- The process of making the primary volume and secondary volume identical after a communication downtime or upon the initialization of the mirroring.
- The action of forcing certain points in the execution sequences of two or more asynchronous procedures to coincide in time.
- The process of coordinating node components with the image profile to maintain consistency.
synchronization character (SYN, SYN character)
In binary synchronous communications, the transmission control character that provides a signal to the receiving station for timing the characters received.
A set of data containing the history of changes (such as updates and deletes) to the data in a particular table. Historical data is stored in shadow tables. Historical information is required for incremental publications. See also incremental publication, shadow table.
synchronization level (sync level)
The level of synchronization (0, 1, or 2) established for an APPC session between intercommunicating CICS transactions. Level 0 gives no synchronization support, level 1 allows the exchange of private synchronization requests, and level 2 gives full CICS synchronization support with backout of all updates to recoverable resources if failure occurs.
A message that consists of one or more synchronization operations (propagation of transactions or refresh requests). See also transaction propagation.
In high availability disaster recovery, an option that specifies the level of coordination between the primary and standby databases when logs are sent from the primary database to the standby database in peer state. Synchronization mode determines the balance between performance and the potential for data loss. See also asynchronous mode, near synchronous mode, super asynchronous mode, synchronous mode.
- A point in time from which IMS or an application program can start over if a failure makes recovery necessary. The two types of synchronization points are system checkpoints done by IMS itself, and application program synchronization points (also known as commit points) done on behalf of individual application programs. See also commit point, system checkpoint.
- In OSI, a point to which a session can be reset. Setting a synchronization point requires the appropriate token. Synchronization points are a session-layer service.
- In APPC, a reference point during transaction processing to which resources can be restored if a failure occurs.
synchronization time interval
The elapsed time in seconds between storage management subsystem (SMS) checks for volume status, space statistics, and configurational changes from other systems in the SMS complex (SMSplex).
- To add, subtract, or change one feature or artifact to match another. See also reconcile.
- In mobile computing, to update devices and a base station (such as a personal computer) simultaneously such that the information on both devices reflect each other (parallel calendar entries, read emails, application downloads, and so on). See also calendaring.
In Contributor, a function used to update all cubes and links in an application when the underlying objects in Analyst change. Changes include renaming dimensions, and adding, deleting, or renaming dimension items.
- In cross-site mirroring, pertaining to the mode of geographic mirroring where the program that issues the update waits until the operation is completed on both the production copy and the mirror copy. This mode ensures that once control is returned to the client, the operation is accurately reflected on both the production copy and the mirror copy.
- Occurring with a regular or predictable time relationship.
- Pertaining to two or more processes that depend upon the occurrences of specific events, such as a common timing signal. See also asynchronous.
- Pertaining to a mode of coordination of communication among distributed processes that requires request-reply pairs to occur within the bounds of a specified time interval in which the communication session is live.
A request sent by an object that pauses to wait for results. See also asynchronous action.
Synchronous Data Link Control (SDLC)
A protocol for managing synchronous information transfer over a data link connection. See also binary synchronous communication.
synchronous disk I/O
In Performance Tools, a disk access operation that must complete before program operation can continue. See also asynchronous disk I/O.
In IPDS architecture, a data-stream or resource-storage exception that must be reported to the host before a printer can return a Positive Acknowledge Reply or can increment the received-page counter for a page containing the exception. Synchronous exceptions are those with action code H'01', H'0C', or H'1F'. See also asynchronous exception.
A method of communication between programs in which a program places a message on a message queue and then waits for a reply to its message before resuming its own processing. See also asynchronous messaging.
In high availability disaster recovery, the synchronization mode in which the primary database considers a transaction to be committed when it gets an acknowledgment message from the standby system that confirms that the relevant log data was received and written to disk on the standby system. See also synchronization mode.
In VTAM, a communication, or other operation in which VTAM, after receiving the request for the operation, does not return control to the program until the operation is completed. See also asynchronous communication, asynchronous operation.
A function of a storage server that maintains a consistent copy of a logical volume (LVOL) on the same storage server or on another storage server. All modifications that any attached host performs on the primary LVOL are also performed on the secondary LVOL. See also Peer-to-Peer Remote Copy, PPRC Extended Distance.
A series of operations that are done as part of the job in which they were requested; for example, calling a program in an interactive job at a work station. See also asynchronous processing.
A communications protocol that is used to send and receive data across high-speed mainframe networks. Data is synchronized and transmitted using constant intervals between data bits and characters.
A shard that receives updates as part of the transaction on the primary shard to guarantee data consistency, which can increase the response time compared with an asynchronous replica. See also asynchronous replica.
- A type of replication in which the application write operation is made to both the source volume and target volume before control is given back to the application. See also asynchronous replication.
- A type of replication that delivers updates continuously and within the scope of source transactions. See also asynchronous replication.
In VTAM, a request for a synchronous operation. See also asynchronous request.
A method of transmission in which the sending and receiving of data is controlled by timing signals. See also asynchronous transmission.
A form of synchronous I/O that writes the file data to disk, updates the inode times, and writes the updated inode to disk. When the write returns to the caller, both the data and the inode have been written to disk.
See synchronization level.
- A point during the processing of a transaction at which protected resources are consistent.
- See point of consistency.
sync point services (SPS)
The component of the sync point manager that is responsible for coordinating the managers of protected resources during sync point processing. SPS coordinates two-phase commit protocols, resync protocols, and logging.
- A multilevel tree structure representing a hierarchical relationship among transaction programs and other resource managers in a distributed two-phase commit operation. The root node of the sync point tree is the initiator of the original commit or backout request.
- The tree of recovery managers and resource managers that are involved in a logical unit of work, starting with the recovery manager, that make the final commit decision.
Synergistic Processor Element (SPE)
In the Cell Broadband Engine architecture, a grouping of multiple Synergistic Processor Units (SPUs). The SPEs perform specialized tasks that involve high computational density, such as those required by game, multimedia, and broadband applications. See also Cell Broadband Engine processor, Synergistic Processor Unit.
Synergistic Processor Unit (SPU)
A 128-bit processor with single-instruction multiple-data (SIMD) capabilities specialized for computationally-intensive tasks. The SPUs use a specialized instruction set, for SIMD operations. Multiple SPUs make a up a Synergistic Processing Element (SPE). See also Synergistic Processor Element.
A type of denial-of-service attack in which an attacker sends a large number of TCP connection requests to a target computer, without answering the target computer's acknowledgment requests. The target computer becomes overloaded and denies service to legitimate users.
- A name that is assigned to a table, view, or sequence and that can be used in place of the original name. A synonym does not replace the original name; instead, it acts as an alias for the table, view, or sequence.
- In SQL, an alternative name for a table view. Synonyms can be used to refer only to objects at the subsystem in which the synonym is defined. A synonym cannot be qualified and can therefore not be used by other users.
- See alias.
- A term in a business glossary that has the same meaning as another term. A term can have multiple synonyms. The relationship is symmetrical and transitive; that is, if term A is a synonym of term B, and term B is a synonym of term C, each term is a synonym of the others.
syntactic character set
A set of 81 graphic characters that are registered in the IBM registry as character set 00640. This set is used for syntactic purposes maximizing portability and interchangeability across systems and country or region boundaries. It is contained in most of the primary registered character sets, with a few exceptions. See also invariant character set.
- The rules for the construction of a command or statement. See also semantics.
- In DCE X/Open Object Management (XOM), any of the various categories into which the object management (OM) specification statically groups values on the basis of their form.
- The arrangement of and relationship among the elements of a name (or other expression or phrase). For example, English name syntax distinguishes the given names and family names in: Todd Lane and Lane Todd.