This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See device adapter.
See designated approving authority.
See database as a service.
See deactivate link.
See deactivate logical unit.
See deactivate physical unit.
DADSM interrupt recording facility (DIRF)
A provision that ensures that an error is recorded if a system fails or a permanent I/O error occurs during allocation of space or during performance of a routine that updates the volume table of contents (VTOC). The DIRF turns on a bit in the VTOC upon entry to a direct access device space management (DADSM) function and, if no errors occur during processing, turns off that bit upon exiting from that function.
See document access definition extension.
DADX runtime environment
The DADX runtime environment provides information to the DADX web service, including the HTTP GET and POST bindings, the test page, WSDL generation, and the translation of DTD data into XML schema data.
See dump analysis and elimination.
daemon configuration file
In the Distributed Computing Environment (DCE), a file containing information about which daemons are configured on the host, including which environment variables are set, the parameters to pass to the process, the minimum restart interval, and the timeout period.
A process begun by the root user or the root shell that can be stopped only by the root user. Daemon processes generally provide services that must be available at all times, such as sending data to a printer.
See destination address field.
See directed acyclic graph.
A script that runs from the authoring server in an IBM Commerce on Cloud environment for a WebSphere Commerce service offering. This script is responsible for coordinating the routine daily tasks that are typically required for a WebSphere Commerce site to run, such as data loads, search indexing, and data propagation.
In DSDM, a brief daily meeting to review progress and encourage communication. See also scrum.
- See serial connection.
- In CICS intercommunication, the chain of sessions that results when a system requests a resource in a remote system, but the remote system discovers that the resource is in a third system and has itself to make a remote request.
See digital asset management.
See directory access protocol.
See dynamic automatic reconfiguration.
A network of thousands of websites that use anonymity tools to purposely conceal their IP addresses. See also deep web.
See Defense Advanced Research Projects Agency.
See direct access storage device.
DASD conservation option
In Tivoli NetView for OS/390, an installation option that allows Tivoli NetView for OS/390 to be installed without the online help facility and hardware monitor data presentation panels.
DASD fast write (DFW)
A function in which data is written concurrently to cache and nonvolatile storage, and automatically scheduled for destaging to DASD. Both copies are retained in the storage control until the data is completely written to the DASD, providing data integrity equivalent to writing directly to the DASD. Use of DASD fast write for system-managed data sets is controlled by storage class attributes to improve performance. See also cache fast write, dynamic cache management.
See DASD volume authority.
A direct access storage device (DASD) space identified by a common label and accessed by a set of related addresses. See also primary storage.
- A user interface component that provides a comprehensive summary of pertinent information from various sources to the user.
- A web page that can contain one or more widgets that graphically represent business data.
- A graphical user interface that presents information and enables users to control specific activities.
- A collection of actionable key performance indicators displayed to the user.
- A graphical user interface that enables users to monitor and manage activities. A dashboard provides a consolidated view of status information that is obtained from various sources.
- A collection of key reports in a visual format that is designed for various user functions. All frequently used reports can be monitored in a single page using a dashboard.
- An interface that integrates data from a variety of sources and provides a unified display of relevant and in-context information.
- A module that migrates real-time data streams such as computer aided dispatch into a monitoring interface.
- In agile software development, a tool for tracking progress that displays metrics such as the number of total tasks, user stories and a burndown or velocity chart.
A representation of facts or instructions in a form suitable for communication, interpretation, or processing by human or automatic means. Data includes constants, variables, arrays, and character strings.
A data type with a private representation and a public set of operations (functions or operators) which restrict access to that data type to that set of operations. The C++ language uses the concept of classes to implement data abstraction.
- In PL/I, an array or a structure.
- A logical collection of data elements that can be referred to either collectively or individually.
- An area of memory that contains specific control variables that are normally predefined in structures or vectors.
- A system object used to communicate data, such as CL variable values between the programs within a job and between jobs. The system-recognized identifier for the data area is *DTAARA.
- A memory area that is used by a program to hold information.
- An area of a predefined length and format on a panel in which data can be entered or displayed. A field can consist of one or more data areas.
A specific piece of descriptive information about an object (item) or organization. Examples of item data attributes include product number, product description, product price, and company name.
The degree to which data is available when needed, typically measured as a percentage of time that the system would be capable of responding to any data request (for example, 99.999% available).
data availability as a service
A cloud-enabled disaster recovery as-a-service solution that combines hardware, software, and services to replicate client’s data from their primary site to a resilient data center.
A container of object properties that the MQAI uses in administering queue managers. There are three types of data bag: user (for user data), administration (for administration with assumed options), and command (for administration with no options assumed).
A collection of interrelated or independent data items that are stored together to serve one or more applications. See also database server.
- A short name used to identify the parameters required to connect to a specific database.
- The name of the target server if it is different from the location name. The database alias is used to provide the name of the database server as it is known to the network. See also alias.
An authority that authorizes the possessor to perform database-level tasks, such as connecting to the database or creating packages in the database. See also authority level, authorization.
database backup series
One full backup of the database, plus up to 32 incremental backups made since that full backup. Each full backup that is run starts a new database backup series. A number identifies each backup series. See also database snapshot, full backup.
A section of memory on a Domino server where databases are stored for quick access. Administrators can display cache statistics, change the number of databases that a server can hold in its cache, close all databases in the cache, and disable the cache.
A database containing information about databases stored on a single Domino server, a group of servers, or all the servers in a domain. Database catalogs are commonly used to let users add the databases in them to the user's desktop.
database configuration file
The configuration file for an individual database. See also configuration file.
database configuration parameter
A parameter whose value limits the system resources that a database can use. See also configuration parameter.
database/data communication (DB/DC)
Program products that provide a method to separate the designer and programmer from the physical aspects and constraints of data storage and the physical characteristics of the terminal network, so that maximum effort can be placed on the applications.
database data set (DBDS)
A data set that contains some or all of the database records that are stored in a full-function database. Other types of data sets that are used in IMS databases include Fast Path area data sets, HALDB indirect list data sets, and HALDB primary index data sets.
database description (DBD)
The collection of macro parameter statements that define the characteristics of a database, such as the database's organization and access method, the segments and fields in a database record, and the relationship between types of segments.
database descriptor (DBD)
An internal representation of a DB2 for z/OS database definition, which reflects the data definition that is in the DB2 for z/OS catalog. The objects that are defined in a database descriptor are table spaces, tables, indexes, index spaces, relationships, check constraints, and triggers. A DBD also contains information about accessing tables in the database.
database event reader
An event reader that monitors an SQL database event source for new and modified events and triggers policies based on the event information. See also event reader.
A group of built-in database objects and supporting code that extends an Informix database server to manage specialized data or add new features. For example, the basic text search database extension enables searching for words and phrases in a document repository stored in a column of a table. See also DataBlade module.
- In Lotus Notes, a file with the extension NSF that contains the data for an application. Its structure is composed of forms, fields, folders, views, and other presentation features, such as a navigator and a database icon.
- One of several types of the system object type *FILE kept in the system that contains descriptions of how input data is to be presented to a program from internal storage and how output data is to be presented to internal storage from a program.
database global variable
A global variable whose value is shared across all sessions in a database. See also built-in global variable, global variable, session global variable, user-defined global variable.
See database identifier.
- The time stamp that is located in the Notes database header and that indicates when a Notes database was first created or when the Fixup task last ran on it.
- An internal identifier of the database.
See database manager instance.
The protection of data items in a database while they are available to any application program. This protection includes the isolation of effects of concurrent updates to a database by two or more application programs.
A kind of data sharing that enables application programs in one IMS to read data while another program in another IMS reads from the same database or updates it. See also block-level sharing.
In an RSR environment, a tracking subsystem that tracks the active subsystem's databases or areas. See also recovery-level tracking.
A database that lists database links and uses replication ID numbers to locate databases on various servers. For example, a corporate database library might contain databases that deal with corporate policies and procedures.
A set of primary and secondary log files consisting of log records that record all changes to a database. The database log is used to roll back changes for units of work that are not committed and to recover a database to a consistent state.
database-managed space table space (DMS table space)
A table space whose storage space is managed by the database manager. See also system-managed space table space.
- A software system that controls the creation, organization, and modification of a database and the access to the data that is stored within it.
- See database manager.
- A program that manages data by providing centralized control, data independence, and complex physical structures for efficient access, integrity, recovery, concurrency control, privacy, and security. See also data server.
- A person with Manager access to a Notes database, whose responsibilities include setting up and maintaining access to the database and monitoring database replication, usage, and size.
database manager configuration file
The configuration file for a DB2 instance. See also configuration file.
database manager configuration parameter
A configuration parameter whose value is set when an instance is created. Most database manager configuration parameters affect the amount of system resources that is allocated to a single instance of the database manager, or they configure the setup of the database manager and the different communications subsystems based on environmental considerations.
database monitor (DB monitor)
See IMS monitor.
See database partition.
- An object that a user creates in the database, such as a procedure, trigger, or any other object that can be created by issuing a CREATE statement.
- An object that exists in an installation of a database system, such as an instance, a database, a database partition group, a buffer pool, a table, or an index. See also object.
A portion of the database that contains user data and indexes. There can be multiple database partitions in a partitioned database environment. See also data partition, database partition group, database partitioning, distribution key, table-partitioning key.
database partition group
A named subset of database partitions that is grouped together with a common distribution map. All table spaces that are created under the same database partition group have data on the same set of database partitions. See also database partition.
- A data organization scheme in which table data is divided across multiple database partitions based on the hash values in one or more distribution key columns of the table and based on the use of a distribution map of the database partitions. Data from a given table is distributed based on the specifications that are provided in the DISTRIBUTE BY clause of the CREATE TABLE statement. See also data partition, database partition, massively parallel processing, table partitioning.
- A portion of the database that contains user data and indexes. There can be multiple database partitions in a partitioned database environment.
database program communication block (DB PCB)
The PCB that describes an application program's interface to a database. One DB PCB is required for each database view that is used by the application program.
In an IMS database, a collection of segments that contains one occurrence of the root segment type and all of its dependents arranged in a hierarchic sequence. A database record can be a physical database record or a logical database record. See also logical database record, physical database record.
Database Recovery Control (DBRC)
A feature of the IMS Database Manager that facilitates easier recovery of IMS databases. DBRC maintains information that is required for database recoveries, generates recovery control statements, verifies recovery input, maintains a separate change log for database data sets, and supports sharing of IMS databases and areas by multiple IMS subsystems.
database recovery log
See database log.
database reference field
In the Data Description Specifications Design Utility (DSU), a field in a data description specifications (DDS) source file that is created by referring to the description of an existing field in a database file.
- Component of the CICS-DBCTL interface in the CICS address space. Its functions include requesting connection and disconnection from DBCTL, telling CICS when a shutdown of DBCTL has been requested or if DBCTL has failed, managing threads, establishing contact with the DBCTL address space, and loading the DRA startup parameter table.
- An interface to IMS DB full-function databases and DEDBs. The DRA can be used by a coordinator controller (CCTL) or a z/OS application program that uses the ODBA interface.
- A software program that uses a database manager to provide database services to other software programs or computers. See also database.
- The server on which the database application and database are installed.
A complete backup of the entire database to media that can be taken off-site. When a database snapshot is created, the current database backup series is not interrupted. A database snapshot cannot have incremental database backups associated with it. See also database backup series, full backup.
database storage area
A content storage area that retains document content in a database engine. The database storage area also retains all objects contained in the object store, such as class definition, property definition, containment, storage policy, and queue events. See also content storage area.
database system monitor
A collection of APIs that gathers information regarding the state of the database system at the instance, database, and application levels. This information is stored in data elements, which can be examined by taking point-in-time snapshots or by using the event monitor to log system activity over time.
- A component that converts protocol-specific local data to and from a business object.
- A mapping between data in one system, such as IMS, to another, such as Java data objects.
- A process that allows the user to represent some form of data as an object in memory.
A package of database objects and supporting code that extends an Informix database server to manage new kinds of data or add new features. A DataBlade module can include new data types, routines, casts, aggregates, access methods, SQL code, and client code. See also database extension.
- A buffer in memory that holds data blocks.
- A cache for providing data to the processor faster than it can be obtained from RAM.
- In Sterling Order Management, the process of using attribute values that are input by the user as the basis for Greex rule processing for validation rules.
- The process of collecting and automatically interpreting data.
data carrier detect (DCD)
A signal defined in the EIA-232 standard that indicates to the data terminal equipment (DTE) that it is receiving a signal from the remote data circuit-terminating equipment (DCE).
data category group
A group whose members have access to a specific category of data, for example, medical and public health data, or environmental data. Membership of a data category group is assigned to give a user the appropriate level of access to data. Each user is added as a member of the appropriate group or groups.
- A centralized repository of data and information relating to a particular field of knowledge. See also green data center.
- The physical location of the servers that provide cloud services.
- A secure, limited-access room that contains hardware and communications equipment to serve the internal network.
- In a virtualized environment, a container that holds hosts, clusters, networks, and data stores.
data center device
See data center asset.
data center model (DCM)
A centralized repository, containing physical and logical assets, that Tivoli Intelligent Orchestrator manages, and their relationships. The data center model tracks data center devices, their configuration, and associated allocations to applications.
See input/output channel.
data character set
See character set.
- A synchronous or asynchronous indication of a condition caused by invalid data or incorrect positioning of data. Some data checks can be suppressed.
- An operation used to verify data quality or data integrity.
data circuit-terminating equipment (DCE)
The equipment that provides signal conversion and coding between the data terminal equipment (DTE) and the line. The DCE provides all the functions required to establish, maintain, and end a connection.
- A group of data categories.
- An access bean that provides data storage and access methods for caching enterprise bean properties. Unlike copy helpers, data class access beans work with enterprise beans that have local client views as well as remote client views.
- In information analysis, a classification that designates the logical type of data in a data field. A data class categorizes a column according to how the data in the column is used. For example, the classification INDICATOR represents a binary value such as TRUE/FALSE or YES/NO.
- A named list of allocation and space attributes that the system uses when creating a data set. The storage administrator uses the Interactive Storage Management Facility (ISMF) to define data classes, but the affected data sets are not required to be managed by the storage management subsystem (SMS). See also storage construct.
The process of detecting, correcting, or removing incomplete, inaccurate, and irrelevant parts of data. The process of fixing the data involves standardizing, matching, and deduplicating data such that it conforms to organizational requirements prior to using it within a data warehouse.
data click activity
An action that simplifies a data integration task, such as the delivery of information from source to target data sources. One example of a data click activity is defining offload requests.
- The process of obtaining performance and availability monitoring data and providing that data to a metric evaluator. Examples of data collectors include Domain Name System (DNS) probes, web page analyzers, or database analyzers. See also discovery.
- Input data.
- The process of collecting data from one or more sources, cleansing and transforming it, and then loading it into a database.
data collection application
An Interactive Storage Management Facility (ISMF) application that allows the storage administrator interactively to submit IDCAMS DCOLLECT background jobs or to save job control language (JCL) for later use.
Data Collection Data Model
A series of COM components and interfaces that allow an OLE DB consumer to access data that is stored in a standard database or in a proprietary format. The consumer accesses the data source through a data source component that is specific to a particular kind of data source. Case data is accessed by using the Case Data Model (CDM), and metadata is accessed through the Metadata Model (MDM).
data communication program communication block (DC-PCB)
See telecommunication program PCB.
- The part of a Virtual Storage Access Method (VSAM) data set, alternate index, or catalog that contains the object's data records.
- A component that holds data and test data to determine whether the data meets the criteria that is being evaluated in the logic flow. There are different types of data components, such as containers, qualifiers, spikes, and trends.
- The reduction of data volume on the media that occurs when performing save operations.
- See compression.
- The process of eliminating gaps, empty fields, redundancies, and unnecessary data to shorten the length of records or blocks.
- The state of data that is valid, accurate and up-to-date across systems and data centers. In Global Mailbox, a high degree of consistency comes at the cost of performance.
- A characteristic of the data at the target site where dependent write order is maintained to guarantee the recoverability of applications.
In Performance Toolbox, a description of a program that receives statistics over the network from the xmservd daemon and prints, post-processes, or otherwise manipulates the raw statistics. See also data supplier.
A named area of storage, maintained by BTS, and used to pass data between activities, or between different invocations of the same activity. Each data container is associated with an activity; it is identified by its name and by the activity for which it is a container. An activity can have any number of containers, as long as they all have different names.
- The process of changing data from one form of representation to another.
- The process of changing from one coded character set identifier (CCSID) to another. A system does data conversion when exchanging data with another system that is using a different CCSID.
data country code (DCC)
A 3-digit code, unique to each country or region, that specifies the X.21 call format used by a network in its International Data Number to call another station. See also data network identification code.
A method of breaking up (or decomposing) a program into smaller parts to take advantage of parallelism. Data decomposition divides the data (usually arrays) into smaller parts, each of which is operated on independently. See also functional decomposition.
A method of reducing storage needs by eliminating redundant data. Only one instance of the data is retained on storage media. Other instances of the same data are replaced with a pointer to the retained instance. See also data enrichment, delta encoding, encryption, inline data deduplication, matching, one-source matching, postprocess data deduplication, survivorship.
- In IDDU, information that describes the contents and characteristics of a field, record, or file.
- A program statement that describes the features of, specifies relationships of, or establishes the context of data. A data definition reserves storage and can provide an initial value.
- A data object that defines a database or table.
- The origin of a field that references a data domain and determines the data type and the format of data entry. Data definitions are referenced by line definitions and may be system data definitions or user-defined data definitions.
- A subset of SQL statements that can be used to create, alter, drop, and rename data objects, including databases, tables, views, synonyms, triggers, sequences, and user-defined routines. See also declaration statement.
- A job control statement that is used to define a data set for use by a batch job step, started task or job, or an online user.
Data Description Language
See Data Definition Language.
Data Description Specifications Design Utility (DSU)
A feature of the CoOperative Development Environment/400 licensed program that helps users develop and create display files, printer files, and database files.
- A set of tables that keep track of the structure of both the database and the inventory of database objects.
- In IDDU, an object for storing field, record format, and file definitions. The system-recognized identifier for the object type is *DTADCT.
- A repository of information about an organization's application programs, databases, logical data models, users, and authorizations.
data direction restriction
In Sterling Connect:Direct for z/OS, a security feature that enables the enforcement of more restrictive security parameters on nodes in a network by specifying whether each adjacent node can initiate a RECEIVE, SEND, or RECEIVE and SEND to or from the local node in the network map. See also trusted node security.
A mapping of the data values within a column into a set of categories that are equivalent to a histogram or to a frequency distribution. See also query optimizer.
One of the four main parts of a COBOL program. The data division describes the files to be used in the program and the records contained within the files. It also describes any internal working storage records that are needed.
data driven testing
A scripting technique that stores test input and expected results in a table or spreadsheet, so that a single control script can execute all of the tests in the table. Data driven testing is often used to support the application of test execution tools such as capture/playback tools. (ISTQB) See also keyword driven testing.
- An entity in an OPL model that represents input data as well as the result of declarative calculations. See also variable.
- The smallest unit of data in an electronic data interchange. A sender ID and a receiver ID are examples of data elements.
- A unit of storage in a coupling facility list structure that makes up a data entry.
- A unit of data that cannot be divided. An example is the data element "age of a person" with values consisting of all 3-decimal digit combinations.
- The smallest unit of data that can be referred to.
- See monitor element.
data element separator
The character that is placed before each data element in a segment to mark the beginning of that data element, to identify where one variable-length data element ends and another begins.
- In computer security, a 64-bit block cipher that uses a 64-bit key, of which 56 bits are used to control the cryptographic process and 8 bits are used for parity checking to ensure that the key is transmitted properly.
- In Cryptographic Support, the equivalent to the Data Encryption Standard.
Data Encryption Standard (DES)
A cryptographic algorithm designed to encrypt and decrypt data using a private key. See also Triple Data Encryption Algorithm.
A software engineer who gathers, collects, aggregates, processes, and manages data in large sets. A data engineer develops, maintains, and evaluates big data solutions and database systems and prepares data for analysis by data scientists.
- The entry of characters into a computer system for processing, usually in predefined fields that are controlled by an application. See also text entry.
- A catalog entry that describes the data component of a cluster, alternate index, page spaces, or catalog. A data entry contains the data component's attributes, allocation and extent information, and statistics. A data entry for a cluster's or catalog's data component can also contain the data component's passwords and protection attributes.
- Part of a coupling facility list structure list entry that is used to hold user-specified data.
data entry database (DEDB)
A direct-access database that consists of one or more areas, with each area containing both root segments and dependent segments. DEDBs use a data structure that allows them to be used for both hierarchic processing and journaling. The database is accessed by using the VSAM Media Manager. See also Fast Path, sequential dependent segment.
data entry notation
Information that is printed in a paper questionnaire to help data entry personnel enter the respondents' answers correctly. This notation can be for card column-based data entry or for variable-based data entry.
data event control block
A control supplied by an application program to represent a read or write request for the basic direct access method (BDAM), basic partitioned access method (BPAM), or basic sequential access method (BSAM).
Data Exchange (DATEX)
A set of specifications for exchanging traffic information in a standard format between disparate systems. It is aimed at harmonizing the exchange of traffic and travel information at all levels applicable to road operators (non-urban and urban) and service providers. It facilitates the electronic exchange of traffic and travel related data between traffic centers including cross border exchange.
Data Exchange SPI architecture (DESPI)
The interface that resource adapters and runtime components use to exchange business object data. The Data Exchange SPI architecture, which is based on the concept of cursors and accessors, abstracts the data type so that an adapter can be written only once and then work on runtime environments that support different data types, such as data objects and JavaBeans.
Data Facility Sort (DFSORT)
An IBM licensed program that is a high-speed data-processing utility. DFSORT provides an efficient and flexible method for sorting, merging, and copying operations, as well as providing versatile data manipulation at the record, field, and bit level.
Data Facility Storage Management Subsystem (DFSMS)
An operating environment that helps automate and centralize the management of storage. To manage storage, the storage management subsystem (SMS) provides the storage administrator with control over data class, storage class, management class, storage group, and automatic class selection (ACS) routine definitions.
- A user-defined workflow field.
- A column or field that contains a specific set of data values that are common to all records in a file or table.
- The optional third field of a count-key-data (CKD) record. The data field contains data that the program writes. The count field specifies the length of the data field.
- In RJE, a remote job input stream that can contain host system commands and job control language as well as data.
- A group of related data records organized in a specific order. A data file can be created by the specification of FILETYPE(*DATA) on the create commands. See also command file, source file.
- A file that stores data for use by an application or system.
- A flat file containing data to be loaded into the database.
- The information asset that represents a collection of fields that are stored in a single file, such as a flat file, a complex flat file, or a sequential file. See also data set.
- A file that stores a collection of fields in a native system file instead of in a database table.
A configurable feature that allows users to specify data access restrictions in IBM Marketing Software products. Data filters make it possible to restrict the customer data that a user can view and work with.
- A graphical model that defines activities that extract data from flat files or relational tables, transform the data, and load it into a data warehouse, data mart, or staging table.
- The transfer of data between constants, variables, and files by running statements, procedures, modules, or programs.
data flow control
In SNA, a request/response unit (RU) category used for requests and responses exchanged between the data flow control layer in one half-session and the data flow control layer in the session partner.
data flow control layer (DFC layer)
In SNA, the layer within a half-session that (a) controls whether the half-session can send or receive, or both send and receive request units (RUs) at the same time, (b) combines related RUs into RU chains, (c) defines the limits of transactions by using the bracket protocol, (d) controls the connection of requests and responses in accordance with control modes specified when the session is started, (e) creates sequence numbers, and (f) associates requests with responses.
data flow control protocol
In SNA, the sequencing rules for requests and responses by which network addressable units (NAUs) in a session coordinate and control data transfer and other operations, for example, bracket protocol.
data flow graph
A representation of the set of operators and the streams that connect them within a streams processing application. See also composite operator, main composite operator, operator, stream, subgraph.
- A self-contained packet, independent of other packets, that carries information sufficient for routing from the originating data terminal equipment (DTE) to the destination DTE without relying on earlier exchanges between the DTEs and the network.
- A form of asynchronous messaging in which an application sends a message, but does not require a response. See also request/reply.
In Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a datagram-based transport protocol, such as User Datagram Protocol (UDP), that provides a connectionless transport layer.
A part of a datagram that is transported through a network separately from other parts of the same datagram. A datagram can be segmented if it contains too many bytes of data to send at one time.
- A system of data that dynamically caches, partitions, replicates, and manages application data and business logic across multiple servers.
- The cache memory that is used instead of a database for quicker access to data during operations.
- In the GDDM function, a collection of data values displayed, for example, as a pie chart or as the plotted points on a line of a line chart. More than one data group may be displayed on a chart.
- In Business Graphics Utility, a collection of values that identify the comparisons in a chart. For example, the relative size of the slices in a pie chart or the relative height of the bars in a bar chart. See also data value.
A Java class or library of classes that a process uses to transform data into and from specific formats. In the business integration environment, data handlers transform text data of specified formats into business objects, and transform business objects into text data of specified formats.
- See data host node.
- The logical partition that hosts one or more database partitions in a partitioned database environment.
data host node
In a communication management configuration, a type 5 host node that is dedicated to processing applications, and does not control network resources, except for its channel-attached or communication adapter-attached devices. See also communication management configuration host node.
The concept of separating the definitions of logical and physical data such that application programs do not depend on where or how physical units of data are stored; the reduction of application program modification in data storage structure and access strategy.
- The condition that exists as long as accidental or intentional destruction, alteration, or loss of data does not occur.
- The security service that detects whether there has been unauthorized modification of data, or tampering. The service detects only whether data has been modified; it does not restore data to its original state if it has been modified.
- The sharing of data between applications.
- The use of data by systems of different manufacture.
data interchange block (DIB)
A block created by the CICS data interchange program (DIP) to control input and output to SNA batch devices. The DIB is chained to the appropriate TCTTE for the batch device, and is released at the termination of the transaction.
A time period in minutes for the summary data record. See also summary data.
- Self-contained data messages that can be sent or processed by all components.
- In EGL, an area of memory that is not in a structure and is based either on a data item part or on an explicit primitive-type description such as CHAR(3).
- In COBOL, a character or a set of consecutive characters (excluding literals in either case) defined as a unit of data by the COBOL program.
- A unit of information to be processed.
- In the MQAI, an integer or character-string item that is contained within a data bag. A data item can be either a user item or a system item.
Data Language/I (DL/I)
The IMS data manipulation language, which is a common high-level interface between a user application and IMS. DL/I calls are invoked from application programs that are written in languages such as Java, PL/I, COBOL, VS Pascal, C, and Ada. DL/I can also be invoked from assembler language application programs by subroutine calls. IMS lets the user define data structures, relate structures to the application, load structures, and reorganize structures.
- In the GDDM function, a line drawn parallel to a chart axis, through a specified value along the other axis.
- In Business Graphics Utility, a straight line drawn from either axis that shows the exact data values on the chart.
The lifecycle of a unit of data, such as a table or a column, that indicates where the data comes from and how the data changes as it moves between persistent and transient data stores of any type. Lineage is often expressed as a graph of that data flow. Data lineage is most often used for ETL jobs. See also business lineage.
- The physical connection (communications lines, modems, controller, work stations, other communications equipment), and the rules (protocols) for sending and receiving data between two or more locations in a data network.
- See link.
- The field in a Q.922 frame that is used for frame relay routing. Each DLCI identifies a frame relay virtual circuit.
- The numeric identifier of a frame-relay subport or PVC segment in a frame-relay network. Each subport in a single frame-relay port has a unique DLCI.
data link control layer (DLC layer)
In communications, the layer that consists of the link stations that schedule data transfer over a link between two nodes and perform error control for the link. Examples of data link control are SDLC and HDLC.
data link escape character (DLE character)
In binary synchronous communication (BSC), a transmission control character used to indicate that the next character is a control character, not a data character.
data link layer
In the Open Systems Interconnection reference model, the layer that provides services to transfer data between entities in the network layer over a communication link. The data link layer detects and possibly corrects errors that may occur in the physical layer.
data link level
In the hierarchical structure of a data station, the conceptual level of control or processing logic between high level logic and the data link that maintains control of the data link. The data link level performs such functions as inserting transmit bits and deleting receive bits; interpreting address and control fields; generating, transmitting, and interpreting commands and responses; and computing and interpreting frame check sequences. See also packet level, physical level.
- In SNA, a set of rules for data communication over a data link in terms of a transmission code, a transmission mode, and control and recovery procedures.
- The rules that govern control of the physical connection for sending and receiving data between two or more locations in a network. Examples of data link protocols include (a) asynchronous, (b) binary synchronous communications (BSC), (c) Ethernet, (d) synchronous data link control (SDLC), (e) token-ring network, and (f) X.25. See also communications line.
Data Link Service (DLS)
See also called DLS user.
data link switching (DLSw)
A method of transporting network protocols that use an IEEE 802.2 logical link control (LLC) type 2. SNA and NetBIOS are examples of protocols that use LLC type 2. See also encapsulation.
A memory-resident list of names that is constructed from an external data source. Search requests are performed against one or more data lists. See also regularization.
A locale that governs the data manipulated or displayed by a program, which may be different than the UI locale. See also UI locale.
- The insurance of data availability to a single application program as a protection against conflicting updates to a data record.
- The system lock that locks data segment into memory.
Data Lookaside Facility
An MVS service that provides the capability for multiple jobs to share access to large data objects in storage. It enables QSAM and VSAM applications to minimize I/O operations.
- The part of the operating system that controls the storing and accessing of data to or from an application program. The data can be on internal storage (for example, database), on external media (diskette, tape, or printer), or on another system.
- The task of systematically identifying, organizing, storing, and cataloging data in an operating system.
data management application program interface (DMAPI)
The interfaces defined by the Open Group's Data Storage Management (XDSM) specification. These interfaces support the monitoring of events on files and the management and maintenance of the data in a file.
data management block (DMB)
An IMS control block in main storage that describes and controls a physical database. A DMB is constructed from information that is obtained from the ACB library or the DBD library.
data manager server
A server that collects metadata information for client inventory and manages transactions for the storage agent over the local area network. The data manager server informs the storage agent with applicable library attributes and the target volume identifier.
- A subset of SQL statements that is used to manipulate data. SELECT, INSERT, UPDATE, DELETE, and MERGE are data manipulation language statements. See also Data Definition Language, Structured Query Language.
- A subset of SQL statements that is used to manipulate data. Most applications primarily use DML.
- A set of conversion instructions that show the relationship between the data elements or fields in one standard and the equivalent fields or elements in another standard.
- A map that displays information about a data source and provides information about data source type, view options, data overlay, and details about data size and list of files.
- An internal object in a page definition that specifies fonts, page segments, fixed text, page size, and the placement and orientation of text.
- The process of changing characters from one form of representation to another, such as from zoned decimal to packed decimal.
- A defined mapping between the data in a UMF file and the corresponding tables and table columns in the entity database. A data mapping must exist to successfully load data into the entity database.
A subset of a data warehouse that contains data that is tailored and optimized for the specific reporting needs of a department or team. A data mart can be a subset of a warehouse for an entire organization, such as data that is contained in online analytical processing (OLAP) tools.
data mart ETL
In Tivoli Enterprise Data Warehouse, the extract, transform, and load (ETL) process that extracts a subset of data from the central data warehouse, transforms it, and loads it into one or more star schemas. These schemas then can be included in data marts to answer specific business questions. See also central data warehouse ETL.
data mart model
See dimensional model.
In Q replication and event publishing, a message that contains all or part of a committed transaction that involves source tables, a committed operation on a single row in a source table (event publishing only), or all or part of a large object (LOB) value from a row operation within a transaction.
- The movement of data from one physical location to another without disruption of application I/O operations.
- The movement of data when the software is upgraded or the data is transferred to a different hardware server or model.
The process of collecting critical business information from a data source, correlating the information, and uncovering associations, patterns, and trends. See also predictive analytics.
- A simple view of entities and their relationships that can be used by stubs to maintain information. A data model is similar to a relational database, where a data model entity is equivalent to a database table, an instance of an entity to a row in a table, and an attribute to a table column.
- A logical view of the organization of data in a database.
- A common model that facilitates reporting of all types of data from multiple data sources.
- An abstract representation of the business data and metadata used in an installation. A data model contains data sources, data types, links, and event sources. See also company.
- A template that is used to make a file plan object store compliant with certain records management standards. The data model can include metadata and security features.
- A database-specific model that represents relational data objects (for example, tables, columns, primary keys, and foreign keys) and their relationships. A data model can be used to generate DDL statements which can then be deployed to a database server.
- The objects, events, and key-value pairs that publish data to client applications.
- A model defining the structure of business artifacts that are operated upon by business operations.
- A description of the organization of data in a manner that reflects the information structure of an enterprise.
A structured set of techniques for defining and recording business information requirements. It is a depiction of the user's view of the data needs of the organization in a consistent and rigorous fashion. The data model eventually serves as the basis for translation to computer system databases.
data movement operation
An operation that physically moves a row from one location to another location in a table. Examples of data movement operations are updating database partitioning keys and reorganizing tables.
- A device that moves data on behalf of the server. A network-attached storage (NAS) file server is a data mover.
- The program that copies data when a backup of the control data sets is being made.
See multiplexed device.
In COBOL, a user-defined word that names a data item. When used in the general formats, data name represents a word that cannot be subscripted, indexed, or qualified unless specifically permitted by the rules of that format. See also identifier.
data network identification code (DNIC)
A 4-digit code that specifies the X.21 call format used by a network in its International Data Number to call another station. The first three numbers are the data country or region code, and the last number is the country or region network identifier. See also data country code.
- An object that provides information about required activities. Data objects can represent one object or a collection of objects. See also shared managed object.
- A portion of data in a data stream that can be recognized as belonging to a specific type.
- An element of a data structure such as a file, an array, or an operand that is needed for the execution of an application.
- Any object (such as tables, views, indexes, functions, triggers, and packages) that can be created or manipulated using SQL statements. See also business object.
- The data that is stored in an R-tree indexed column of a table and in the R-tree index itself.
- A program variable that provides operational and possibly representational characteristics to byte strings in spaces.
- An object that conveys information, such as text, graphics, audio, or video. See also machine object.
- A piece of client data that is placed on the coupling facility by CQS as a result of a CQSPUT request or a CQSUPD request. From an IMS shared queues point of view, a data object contains one part or all of an IMS message or an entire EMH message. From an IMS Resource Manager point of view, a data object contains information about an IMS resource such as a transaction or a user.
- A collection of data referred to by a single name.
- An object that is either specified within a page or overlay or is identified as a resource using the Map Data Resource (MDR) structured field and later included in a page or overlay. Examples include: PDF single-page objects, encapsulated PostScript objects, and IOCA images.
data object resource
An object container resource or IOCA image resource that is either printer resident or downloaded. Data object resources can be used to prepare for the presentation of a data object, such as with a resident color profile resource object, included in a page or overlay through the Include Object (IOB) structured field; for example, PDF single-page objects, encapsulated PostScript objects, and IOCA images, or invoked from within a data object; for example, PDF resource objects.
- A logical representation of a data slice that is managed by a specific SPU, and which contains the user data that the SPU is responsible for processing during queries.
- A set of table rows that is stored separately from other sets of rows. A data partition is grouped by the specifications that are provided in the PARTITION BY clause of the CREATE TABLE statement. See also database partition, database partitioning, table partitioning, table-partitioning key.
- A VSAM data set that is contained within a partitioned table space.
data-partitioned secondary index (DPSI)
A secondary index that is partitioned according to the underlying data. See also nonpartitioned secondary index.
- A calculated value of a metric at a point in time.
- A name-value pair that represents a unit of business data or a point on a graph. On a graph, a data point is represented as a slice for pie plots, a bar for bar plots, or one point for line plots and area plots. See also data series, name-value pair.
A policy applied to XML or relational data that specifies how entities within a data source are to be masked for data privacy purposes. Data privacy policies mask data that is processed by a data management service.
data privacy template
One of the component projects that make up an Decision Optimization Center application. The data project contains the definition of the application data model, which is the model of the data that is manipulated by the ODM application.
data provider definition
A mapping of the logical column definitions in the application view to physical table columns in the data source. A data provider definition links source data directly to an application view and indirectly to enterprise view tables and columns. A single application view table may have more than one data provider definition, each of which may point to multiple data sources.
The extent to which data has been accurately coded and stored. Factors that adversely affect data quality include missing values, data entry errors, measurement errors, and coding inconsistencies.
data quality management (DQM)
A pipeline process that checks the data for required values, valid data types, and valid codes, and also corrects the data by providing default values, formatting numbers and dates, and adding new codes, if that was configured. Data quality management includes address hygiene and name standardization processing. See also address hygiene, DQM rule, name hygiene, name standardization, pipeline.
data reference line
In the GDDM function, a data line that also acts as a shading boundary for the first data group of a surface chart, histogram, or composite bar chart, or for all the data groups of a multiple bar chart. If no data reference line is present, such data groups are shaded from the horizontal axis.
An entity that manages the synchronization of item data and associated processes within supply chains, through a central database that supports data verification and data change publications.
The process of maintaining a defined set of data in more than one location. Replication involves copying designated changes for one location (a source) to another (a target) and synchronizing the data in both locations.
An expression that is generated out of a data rule definition that evaluates and analyzes conditions found during data profiling and data quality assessment. Data rules define specific tests, validations, or constraints associated with the data.
A set of data points. See also data point.
- A server that provides services for the secure and efficient management of information. See also database manager.
- A device on a local area network (LAN) that provides services, data, or facilities for other devices on the network.
data server client
See IBM data server client.
Data Server Client
See IBM Data Server Client.
data server driver copy
See IBM data server driver copy.
Data Server Provider for .NET
See IBM Data Server Provider for .NET.
data service unit (DSU)
A device that provides a digital data service interface directly to the data terminal equipment. The DSU provides loop equalization, remote and local testing capabilities, and a standard EIA/CCITT interface. See also channel service unit.
- A collection of data, usually in the form of rows (records) and columns (fields) and contained in a file or database table. See also data file.
- A set of parallel data files and the descriptor file that refers to them. Data sets optimize the writing of data to disk by preserving the degree of partitioning.
- See file.
- A collection of interrelated transactional data.
- The major unit of data storage and retrieval, consisting of a collection of data in one of several prescribed arrangements and described by control information to which the system has access.
data set concatenation
The allocation of two or more data sets such that the access method retrieves them as a single data set. The two types of data set concatenation are sequential and partitioned. See also partitioned concatenation, sequential concatenation.
data set definition
A Jazz model object that describes a data set on z/OS and is stored in the Rational Team Concert Jazz repository. If the data set already exists, the data set definition must specify just the data set name. If the data set is new, the data set definition must specify both the name of the data set, and the characteristics of the data set, such as record format. Every data set that a build process references must correspond to a data set definition.
- Removing a data set control block (DSCB) and releasing its space. A tape data set generally is considered to be deleted when its volume or volumes are made available for reuse or destruction. For both disk and tape, deletion generally also includes removing the data set's entry from the catalog DSCB.
- In DFSMShsm, the space management technique of deleting data sets, not managed by the storage management subsystem (SMS), that have not been used for a specified number of days and do not have expiration date protection.
data set group
An operating system data set that contains a subset of a database with one or more unique segment types. A database always consists of at least one data set group. See also primary data set group, secondary data set group.
data set prefix
An identifier that, together with the data set name (indicated in the data set definition), specifies a data set that is allocated to Rational Team Concert. A data set prefix can contain multiple segments, including a high-level qualifier (HLQ); for example, HLQ.PROD. With a prefix defined by a user, artifacts can be modified in isolation from other users.
data set profile
A profile that provides RACF protection for one or more data sets. The information in the profile can include data such as the profile owner, universal access authority, and access list. See also discrete profile, generic profile, profile.
- An interface that monitors the connection between a modem and a telephone circuit, which detects line failure and notifies a user of line drops.
- In the EIA 232 standard, a signal that indicates to the data terminal equipment (DTE) that the local data circuit-terminating equipment (DCE) is connected to the communication channel and is ready to receive data.
data set retirement
In DFSMShsm, the space management technique of deleting data sets, not managed by the storage management subsystem (SMS), that have not been referred to for a specified number of days and have a backup version.
data set stacking
A function that places several data sets on the same tape volume or set of tape volumes. Data set stacking increases the efficiency of tape media usage and reduces the overall number of tape volumes needed by allocation. It also allows an installation to group related data sets on a minimum number of tape volumes, which is useful when sending data off-site.
See DB2 pureScale instance.
- A DB2 subsystem that belongs to a data sharing group.
- A local or remote relational or nonrelational data manager that can support data access using an ODBC driver that supports the ODBC APIs.
See data source.
- The physical connection to a data repository such as a relational database, an OLAP cube, or a Microsoft Excel file.
- An object that represents a repository of information. Although the repository is typically a file server, workstation, email server, or other electronic storage system (such as a content management system), it could be a filing cabinet or a box in a warehouse. Each data source can be associated with an application that knows how to access the data source's information the data can be stored in all or part of one or more physical servers.
- A relational database or XML file that contains data to be processed in a data management service.
- The source of data itself, such as a database or XML file, and the connection information necessary for accessing the data. See also integration adapter, mapping.
- An application, server, transaction, or other process from which raw data is gathered.
- The means by which an application accesses data from a database.
- Data that contains the identities that the user loads into the entity database. Data sources contain identifying data and non-identifying data. Examples of data sources include, but are not limited to, employee databases, watch lists, vendor lists, and customer lists.
- In JDBC, an interface that provides a logical representation of a pool of connections to a physical data source. Data source objects provide application portability by making it unnecessary to supply information specific to a particular database driver.
- The party that owns and provides master data to a community of trading partners to ensure synchronization between the source data and the data of record.
- An external source of data, for example, a database or a file, that can supply a wide variety of data in the required format.
- A storage resource or agent that provides data about a storage environment.
- A repository of data to which a federated server can connect and then retrieve data by using wrappers. A data source can contain relational databases, XML files, Excel spreadsheets, table-structured files, or other objects. In a federated system, data sources seem to be a single collective database.
- A local or remote data manager. In DB2 for z/OS, a data source must be capable of supporting data access through an ODBC, or JDBC driver that supports current APIs.
data source component (DSC)
A COM component that is used to expose data in the data source to the Data Model. Case data is exposed to the Provider by a case data source component (CDSC), and metadata is exposed to the metadata document object by a metadata source component (MDSC). If the data is not in a format that is supported by an existing data source component, a component must be created.
data source object
In a federated system, an object at a remote data source on which operations can be performed. Examples of data source objects are tables, views, synonyms, table-structured files, and Excel spreadsheets. See also nickname.
data source record
data source reference
See external reference.
data space index
A machine interface object that provides an ordering to all or part of the entries in one or more data spaces, provides keyed access to entries in the data spaces, and provides a mechanism for uniqueness in column and field values across data spaces.
data storage-management application-programming interface (DSMAPI)
A set of functions and semantics that can monitor events on files, and manage and maintain the data in a file. In an HSM environment, a DSMAPI uses events to notify data management applications about operations on files, stores arbitrary attribute information with a file, supports managed regions in a file, and uses DSMAPI access rights to control access to a file object.
See data store.
- The location where one or more Contributor applications are stored. A data store contains the information needed to connect to a database supporting the Contributor applications.
- A place (such as a database system, file, or directory) where data is stored.
- A data structure where documents are kept in their parsed form.
- In a virtualized environment, the location where virtual machine data is stored.
- A component that manages the job runtime information at the tracked system. A data store is dedicated to the storing and possible retrieval of sysout data sets belonging to submitted jobs, to optimize the sysout availability.
- A logical container for different schemas and directories.
- An object that represents an event.
- The commands, control codes, data, or structured fields that are transmitted between an application program and a device such as printer or nonprogrammable display station.
- A string of information that serves as a source of package data.
In IPDS architecture, a condition that exists when the printer detects an invalid or unsupported command, order, control, or parameter value from the host. Data-stream exceptions are those whose action code is X'01', X'19', or X'1F'.
- The uninterrupted transfer of information over an interface in order to achieve high data transfer rates.(A)
- In printing, a noninterlocked method of data transfer used by the printer channel to decrease data transfer time during write operations.
A Data Manager object that is required wherever mapping is performed. A DataStream item is used to map a data source column to a transformation model element in a fact build, or a level attribute in a reference structure.
- In Open Source Initiative (OSI), the syntactic structure of symbolic expressions and their storage allocation characteristics.
- A structure that describes how data is organized, arranged, and represented, such as in a string or array of integers.
- An area of storage that defines the layout of the fields, called subfields, within the area. A data structure is program described.
- The composition of the data, including repeating sub-structures, nested groupings, sequences, and choices.
In Performance Toolbox, a program that supplies statistics across a network. See also data consumer.
A user-defined numeric value that uniquely identifies a group of data. Data tags can be assigned to table spaces or storage groups and are used in DB2 workload management configurations to monitor and control activities based on which data the activities access.
- A device on a data link that sends and receives data, and provides data communications control functions according to protocols.
- In OSI, a physical node on a network.
- A communications device that is the source or destination of signals in a network, it is typically a terminal or computer.
data traffic reset state
The state a session usually enters before the start data traffic state, and after Clear or Bind Session, if cryptography verification (CRV) is used. While a session is in this state, requests and responses for data and data flow control cannot be sent. Only certain session control requests can be sent. See also command.
data transfer mode
See data transfer phase.
data transfer rate
The average number of bits, characters, or blocks per unit time passing between corresponding equipment in a data transmission system. The rate is expressed in bits, characters, or blocks per second, minute, or hour. Corresponding equipment should be indicated; for example, modems, intermediate equipment, or source and sink.
Data Transformation Framework (DTF)
An infrastructure that includes data bindings and function selectors, which enables an adapter to convert native data formats to business objects and to convert business objects back to native data formats, such as XML.
Data Transmission Facility (DTF)
In Sterling Connect:Direct For z/OS, the nucleus component that executes user commands and processes. The DTF controls information distribution to other nodes in the network.
data transmission line
See telecommunication line.
See metadata tree.
- In OSI, a category of data clearly defined using a data declaration method, such as ASN.1 or Pascal.
- In CDE, a mechanism that associates particular data files with the appropriate applications and actions.
- In programming languages, a descriptor of a set of values together with a set of permitted operations. A data type determines the kind of value that a variable can assume or that a function can return.
- In SQL, a descriptor of a set of values and a set of permitted operations. A data type determines the kind of value that a column, literal, parameter, special register, or variable can have or that can be the result of an expression, a function, or a method.
- In Informix, a descriptor that is assigned to each column in a table, function argument, or function return type that indicates the type of data that can be held. See also built-in data type, complex data type, distinct data type, opaque data type, user-defined data type.
- An attribute that is used for defining data as either numeric or character or both.
- An element of a data model that represents a set of data stored in a data source, for example, a table or view in a relational database.
- A category that identifies the mathematical qualities and internal representation of data and functions. See also type.
data type mapping
The mapping of a data type to another data type across products or languages. For example, the Oracle type FLOAT maps to the DB2 type DOUBLE. See also forward data type mapping, reverse data type mapping.
- In Business Graphics Utility, a single, numeric data item entered as a value for a horizontal line or vertical line. See also data group.
- The actual information contained in a field, such as "Bob," firstname.lastname@example.org, or 12/27/2013.
A simplified view of a database. Data views enable database administrators or business analysts to define table join criteria, build frequently-used result columns, summarize detail data (when necessary), remove unnecessary columns of data from view, build frequently used Sub-SELECT support, and define understandable column names.
data visibility group (DVG)
In Sterling Control Center, a user defined group that limits the events (data) that a specific user can monitor. See also data visibility group criteria.
data visibility group criteria (DVG criteria)
A set of parameters that are used to define data visibility groups (DVGs). See also data visibility group.
- The process of presenting data patterns in graphical format, including the use of traditional plots as well as advanced interactive graphics. In many cases, visualization reveals patterns that would be difficult to find using other methods.
- A visual display of relationships in multidimensional data that enables analysis.
- A subject-oriented collection of data that is used to support strategic decision making. The warehouse is the central point of data integration for business intelligence. It is the source of data for data marts within an enterprise and delivers a common view of enterprise data.
- A central repository for all or significant parts of the data that an organization’s business systems collect.
A set of hardware and software components that can be used to analyze large amounts of data for making effective business decisions. For example, data warehousing can be used to analyze daily sales information, customer orders, products, inventory, and schedules.
Data Window Services (DWS)
Services provided as part of the Callable Services Library that allow manipulation of data objects such as VSAM linear data sets and temporary data objects known as TEMPSPACE.
In Fibre Channel technology, a type of transmission word that occurs within frames. The frame header, data field, and cyclic redundancy check (CRC) all consist of data words. See also frame, ordered set, transmission word.
A three-part value that designates a day, month, and year: for example, YYYY-MM-DD. See also timestamp.
See Data Exchange.
See direct access unmovable.
DB2 administration server
A control point that is used to assist with administration tasks on DB2 servers and to perform remote tasks on the server and the host system on behalf of a client request. The DB2 administration server is deprecated.
DB2 Call Level Interface
See call level interface.
See IBM data server client.
DB2 cluster services tiebreaker
A shared disk partition that helps determine which group of hosts in the DB2 pureScale instance has the operational quorum and survives if the InfiniBand network encounters a split instance due to a communication failure.
An instruction to the operating system to access and maintain the database manager. For example, DB2 commands can be used to start or stop a database and to display information about current users and the status of databases.
DB2 control server
A DB2 database system that contains the satellite control database, SATCTLDB. See also satellite.
DB2 for i5/OS
The integrated relational database manager on the system. It provides access to and protection for data. It also provides advanced functions such as referential integrity and parallel database processing.
DB2 Geodetic Extender
Formerly a DB2 component that stores and manipulates spatial data using the round-Earth model that is a continuous, closed globe (unlike DB2 Spatial Extender, which treats the Earth as a flat map).
See DB2 Interactive.
DB2 notify log
See administration notification log.
DB2 Query Manager (Query Manager)
Part of the DB2 Query Manager and SQL Development Kit for i5/OS licensed program that is a collection of tools used to obtain information from the DB2 for i5/OS database. DB2 Query Manager can also be used to create query definitions, to run new or existing query definitions, or to format query information.
DB2 Spatial Extender
A DB2 component that stores and manipulates spatial data. DB2 Spatial Extender is used to generate and analyze spatial information about geographic features. See also geographic information system.
See DB2 workload manager.
DB2 workload manager (DB2 WLM)
The subset of DB2 workload management capability that can be used to create a DB2 workload, a DB2 service class, a DB2 threshold, or a DB2 work action set. This subset of capability is controlled by a separate license.
DB2 XML Extender
A program that is used to store and manage XML documents in DB2 tables. Well-formed and validated XML documents can be generated from existing relational data, stored as column data, and the content of XML elements and attributes can be stored in DB2 tables.
See database administrator.
See database access thread.
See database management batch.
See double-byte character large object.
See double-byte character set.
DBCS/EBCDIC mixed field
A field that contains both DBCS and EBCDIC data. The DBCS portions should always be enclosed with SO/SI control characters in both inbound and outbound data. In the case of inbound data, the control characters are automatically created by the terminal.
DBCS font file
A system-supplied file that holds the 24x24 character images of one of the following groups of commonly used characters: 1) Japanese non-Kanji and basic-Kanji, 2) Korean non-Hangeul/non-Hanja, Hangeul, and a subset of Hanja, 3) Traditional Chinese non-Chinese and a subset of primary Chinese characters, or 4) all IBM-defined Simplified Chinese characters.
DBCS font table
A system-supplied table that holds either 24x24 or 32x32 pel character images of a double-byte character set. A Japanese 24x24 DBCS font table holds Japanese extended Kanji and user-defined characters. A Korean 24x24 DBCS font table holds a subset of Hanja and user-defined characters. A Traditional Chinese 24x24 DBCS font table holds a subset of primary Traditional Chinese, all secondary Chinese, and user-defined characters. A Simplified Chinese 24x24 DBCS font table holds IBM-supplied Simplified Chinese characters as well as user-defined characters. A 32x32 DBCS font table holds 32x32 pel character images of a double-byte character set, including its user-defined characters. The system-recognized identifier for the object type is *IGCTBL.
Pertaining to a character string in which each character is represented by 2 bytes. Used only with the EBCDIC encoding scheme. The character string does not contain shift-out (SO) and shift-in (SI) characters. See also DBCS-either, DBCS-only, DBCS-open.
See Database Control.
See database control environment.
See database/data communication.
See database description generation.
See database data set.
See database identifier.
See database instance ID.
See delivery-confirmation bit.
See database monitor.
See database management system.
See database management system driver.
See database program communication block.
See Database Recovery Control.
In IMS Version 10, one or more DBRC instances that share a single RECON data set in an IMSplex environment. Each DBRC group has a group identifier (GROUP ID), which is unique for that group. DBRC groups are used by DBRC, whether or not parallel RECON access is enabled.
See database request module.
The logical unit of storage in an Informix database. For example, a table or table fragment is created in a dbspace. See also root dbspace.
See distribution center.
See Document Content Architecture.
See D-channel backup.
See data country code.
See Data Communications Control.
A group of Distributed Computing Environment (DCE) machines that work together and are administered as a unit. A cell represents a group of users, systems, and resources that typically have a common purpose and share common DCE services.
See Distributed Command Execution Manager.
See delta channel.
D-channel backup (DCBU)
An ISDN NFAS configuration where two of the T1 facilities have a D-channel, one of which is used for signaling, and the other as a backup in case the other fails. See also Non-Facility Associated Signaling.
See data-conversion interface.
See Data Control Language.
See declare control block.
See declarations generator.
See Distributed Component Object Model traffic.
See decision checkpoint.
See data communication program communication block.
See data connection resource.
See Database Connection Services directory.
See discontiguous shared segment.
See data cache unit.
A multi-page spreadsheet made up of two or more dimensions. See also cube.
See Distributed Database Management System.
See dynamic data exchange.
The computer, or an application running on it, that provides dynamic data exchange (DDE) data to another DDE-enabled application. In VisualAge RPG, all components provide DDE server functions.
See Data Definition Language.
See Distributed Data Management Architecture.
A system object with type *FILE, created by a user on the local (source) system, that identifies a data file that is kept on a remote (target) system. The DDM file provides the information needed for a local system to locate a remote system and to access the data in the remote data file.
See Defense Data Network.
See data definition name.
See Dynamic Domain Name System.
See dynamic data object.
See dynamic device reconfiguration.
See digital data service adapter.
See data definition statement.
To take a resource of a node out of service, rendering it inoperable, or to place it in a state in which it cannot perform the functions for which it was designed. See also activate.
In logistics, a distance or period during which a hire vehicle is traveling without generating revenue for its owner. For example, an empty backhaul would give rise to a deadhead distance. See also backhaul.
A repositioning move in which a truck carries no cargo. A deadhead move is necessary when a carrier does not have a backhaul opportunity. See also repositioning leg.
A mailbox that stores messages that cannot be added to a particular mailbox. The primary role of this mailbox is to provide temporary data storage until the administrator can correct the problem.
dead-letter queue handler
A utility that monitors a dead-letter queue (DLQ) and processes messages on the queue in accordance with a user-written rules table. A sample dead letter queue handler is provided by IBM MQ.
deadline WTO message
An operator message (EQQW776I) that is issued when a started operation has not been marked as completed before the deadline time. In addition to the standard message, the user-defined text that describes the operation is issued as part of the WTO.
- Unresolved contention for the use of resources.
- A condition in which two independent threads of control are blocked, each waiting for the other to take some action. Deadlock often arises from adding synchronization mechanisms to avoid race conditions.
- A condition under which a transaction cannot proceed because it is dependent on exclusive resources that are locked by another transaction, which in turn is dependent on exclusive resources in use by the original transaction.
A process within the database manager that monitors the states of the locks to determine whether a deadlock condition exists. When a deadlock condition is detected, the detector stops one of the transactions involved in the deadlock. This transaction is rolled back, and the other transaction can proceed.
An action that occurs when Cluster Aware AIX (CAA) detects that a node has become isolated in a multinode environment. This setting occurs when nodes are not communicating with each other via the network and the repository disk.
deadman switch timer
A kernel timer that works on a node that has lost its disk lease and has outstanding I/O requests. By causing the kernel to panic, this timer ensures that the affected node cannot complete the outstanding I/O requests. If the node were able to complete outstanding I/O requests without a disk lease, file system corruption could result.
- In COBOL, any line with a D in the indicator area of the line.
- A COBOL statement run only when the WITH DEBUGGING MODE clause is specified. Debugging lines can help determine the cause of an error.
A special mode in which a program provides detailed output about its activities to aid a user in detecting and correcting errors in the program itself or in the configuration of the program or system.
- A mode in which a program provides detailed output about its activities to aid a user in detecting and correcting errors in the program itself or in the configuration of the program or system.
- In DFSMShsm, the method of operation that projects the changes that would occur in normal operation but in which no user data is moved.
- An environment in which programs can be tested.
A division of data into ten ordered groups of equal size. The first decile contains 10% (one-tenth) of the records with the highest values of the ordering attribute. See also quantile, quartile, quintile, vingtile.
A numerical data type used in standard arithmetic operations. Decimal constants can contain any digits 0 through 9. See also integer constant.
decimal floating-point number
A 64-bit or 128-bit representation of a number with a precision of 16 or 34 decimal digits and an exponent. Decimal floating-point numbers include normal numbers, subnormal numbers, and the special values of infinity, NaN, and sNaN. In IBM SQL, decimal floating-point numbers are not considered to be floating-point numbers. See also floating-point number, infinity, normal number, not-a-number, signaling NaN, subnormal number.
In Cryptographic Support, a table of 16 decimal characters that is used to convert a hexadecimal value to a decimal value. Each hexadecimal digit is used as an offset in the (decimalization) table and is replaced with the value found there.
- The location of the decimal point in a series of numbers.
- Numbers to the right of the decimal point. For example, 4.009 has three decimal positions.
- A gateway within a business process where the sequence flow can take one of several alternative paths.
- The component of a policy expression that indicates the specific behavior or property that the policy affects. Types of decisions include actions, goals, results, and configurations. See also decision name.
- A gateway that routes an input to one of several alternative outgoing paths, depending on its condition. A decision is like a question that determines the exact set of activities during the execution of a process. Questions might include: What type of order? Or How will the order be shipped?
- In the IBM Integrated Project Development (IPD) project governance methodology, a point at which the team decides whether to commit to further work. Acronym: DCP. For example, the Plan DCP is the point at which a product team makes plan commitments to the business, including the feature-level requirements to be delivered.
- A business transformation operations process (BTOP) that consists of three phases: concept, plan, and qualify.
An implementation of the rule engine that compiles rulesets into executable or intermediate code and can optimize the performance of the rulesets. See also rule engine.
A syntax that is used to express a combination of decision variables in a more compact way. See also decision variable.
decision federator (DF)
See policy editor storage.
In a policy-enabled system, a data value (along with its name and type) or sensor value that the managed resource provides to the autonomic manager and that the autonomic manager uses when making a decision.
Decision Model and Notation (BMN)
An industry standard for describing and modeling organizational decisions that was published by the Object Management Group to support decision management and business rules.
An attribute that identifies a specific decision of a result-based policy or a configuration-profile-based policy that is used for solicited decision requests. All policies in a policy set have the same decision name and use the same collection of names and types of result values, which are returned by the autonomic manager during policy evaluation. See also decision, policy set.
- A representation of an if-then=else condition on a decision tree where a choice between at least two possible alternatives is made.
- A representation of an if-then-else condition. A decision node splits a single transition in a statechart or activity diagram into several branch transitions.
In Policy Management for Autonomic Computing, the data value (along with its name and type) in a result-based policy or a configuration-profile-based policy that is used for solicited decision requests. A decision output is the data value that is returned by the autonomic manager that represents the decision in the policy.
- A part of a program in a policy-enabled system that requests and accepts solicited decisions from an autonomic manager. A managed resource contains one or more decision points, which provide policy support for the managed resource. See also autonomic manager.
- An intersection in a business process that determines the next step in the business process. A decision point is much like an if/then statement, in which the answer determines the next action.
decision point pattern
A set of interfaces that are linked and that provide developers with a framework for implementing policy-based management in their applications. Each decision point pattern identifies where decision points are needed in the application to implement the operational flow. Policy Management for Autonomic Computing provides three decision point patters: an auditor pattern, which checks compliance with a specific set of policies; a planner pattern, which uses policies to design or configure a new system; and a virtualization pattern, which provides a virtualized interface to a physical system.
A set of related decisions that are contained in a business rule application. Rules make up the decision service and determine its behavior. Decision services can be organized into one or more rule projects.
An application that provides information that is used for strategic planning, decision-making, and reporting. It typically executes in a batch environment in a sequential scan fashion and returns a large fraction of the rows scanned. Decision-support queries typically scan the entire database.
A query that a decision-support application generates. A decision support query often requires multiple joins, temporary tables, and extensive calculations, and can benefit significantly from PDQ.
A form of business rule that captures multi-conditional decision-making business logic in a table where the rows and columns intersect to determine the appropriate action. See also ruleset.
decision tree algorithm
An algorithm that classifies data, or predicts future outcomes, based on a set of decision rules. Examples of decision tree algorithms are C & R tree, CHAID, QUEST, and C5.0. See also Chi-squared Automatic Interaction Detector algorithm, Quick, Unbiased, Efficient Statistical Tree algorithm, rule set.
Decision Validation Services (DVS)
A set of testing and simulation capabilities with which business users and policy managers can verify the rules they have written, and determine if potential changes will have the intended outcome.
An XML document that contains a collection of Wireless Markup Language (WML) cards. See also card.
- In Java programming, a statement that establishes an identifier and associates attributes with it, without necessarily reserving its storage or providing the implementation. (Sun)
- In Ada language, a construct that associates an identifier (or some other notation) with an entity. This association is in effect within a region of text called the scope of the declaration. Within the scope of a declaration, there are places where it is possible to use the identifier to refer to the associated declared entity. At such places the identifier is said to be a simple name of the entity; the name is said to denote the associated entity.
- In the C and C++ languages, a description that makes an external object or function available to a function or a block statement.
- A statement that establishes the names and characteristics of data objects and functions used in a program.
declarations generator (DCLGEN)
A subcomponent of DB2 for z/OS that generates SQL table declarations and COBOL, C, or PL/I data structure declarations that conform to the table. The declarations are generated from DB2 system catalog information.
Pertaining to a statement, model, or application that assumes no particular order. That is, the result does not depend on the order of statements, or parts of the model, or components of the application.
An identifier and optional symbols that declare a single function, object or data type within a declaration. See also function declarator.
- To create a record object.
- To assign the attributes of a variable.
A document that has been declared as a record. A declared document cannot be deleted until its associated record is deleted. The author can no longer modify the declared security of the declared document.
declared temporary table
A table that holds temporary data and is defined by using the SQL statement DECLARE GLOBAL TEMPORARY TABLE. Information about declared temporary tables is not stored in the DB2 catalog, so this kind of table is not persistent and can be used only by the application process that issued the DECLARE statement. See also base table, created temporary table, temporary table.
For Department of Defense (DoD), to lower a record classification from a classified status, like Secret, to Unclassified. Declassifying a record by downgrading to Unclassified is not allowed.
declustered RAID (DRAID)
See also rebuild area.
A network architecture that defines the operation of a family of software modules, databases, and hardware components typically used to tie Digital Equipment Corporation systems together for resource sharing, distributed computation, or remote system configuration. DECnet network implementations follow the Digital Network Architecture (DNA) model.
- A device that has a number of input lines of which any number may carry signals and a number of output lines of which not more than one may carry a signal, there being a one-to-one correspondence between the outputs and the combinations of the input signals. (I)(A)
- In bar codes, the component of a bar code reading system that receives the signals from the scanner, performs the algorithm to interpret the signals into meaningful data, and provides the interface to other devices.
- The process of breaking up an XML document for storage in database tables.
- The separation of a compound word into its constituents (or formation elements). Internally this consists of three distinct steps: segmentation, normalization, and annotation.
- The process of restoring compressed data to its original state, so that it can be used again.
- A function that expands data to the length that precedes data compression.
- A function that exchanges control characters for actual data.
In graphical user interfaces (GUIs), a glyph that annotates a resource with status information, for example to indicate that a file has changed since it was last saved or checked out of a repository.
- To decipher data.
- In Cryptographic Support, to convert ciphertext into plaintext. See also encrypt.
- In computer security, the process of transforming encoded text or ciphertext into plaintext.
- The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.
See data entry database.
A private cloud computing environment that provides infrastructure with single-tenant hardware. See also borderless.
A trucking fleet that is owned by the carrier but is licensed for exclusive use by one or more shippers. A shipper arranges with the carrier to use the dedicated fleet, which helps ensure that the needed truck capacity is always available. See also preferred fleet, private fleet.
dedicated RoCE environment
An environment in which only a single operating system instance can use a physical RoCE feature. A dedicated RoCE environment applies to an IBM zEnterprise EC12 (zEC12) with driver 15, or an IBM zEnterprise BC12 (zBC12).
dedicated save operation
An operation that the user runs to save objects when no other jobs are running. See also save-while-active operation.
dedicated service tools (DST)
Service functions that are available only from the console and that can run when the operating system is not available, as well as when the operating system is available.
To reduce storage needs by eliminating redundant data. Only one instance of the data is retained on storage media, such as disk or tape. Other instances of the same data are replaced with a pointer to the retained instance.
- See data deduplication.
- The process of creating representative records from a set of records that have been identified as representing the same entities. See also data enrichment, matching, one-source matching, survivorship.
- The process of removing identical search results that were returned from one or more data sources. See also near deduplication.
The IBM Watson deep question analysis and evidence-based reasoning system that competed on the Jeopardy! game show. It also refers to the research team and research project that was devoted to building the software that uses advanced natural language processing, semantic analysis, information retrieval, automated reasoning, and machine learning to answer questions.
Any web content that is not indexed, and therefore cannot be found, by a standard search engine. See also dark web.
- Pertaining to an attribute, value, or option that is assumed when none is explicitly specified.
- A value that is automatically supplied or assumed by the system or program when the user does not specify a value.
See default access control list.
The action designated to execute when a Fixlet is deployed. When no default action is defined, the operator is prompted to choose between several actions or to make an informed decision about a single action.
default agent site
An agent site that is located on the same system as the control server. A remote agent site does not require the installation of IBM DB2 Warehouse Manager Standard Edition. See also agent site, remote agent site.
An argument that is declared with default values in a C++ function prototype or declaration. If a call to the function omits this argument, a default value is used. An arguments with a default value must be the trailing argument in a function prototype argument list.
In the C or C++ languages, within a switch statement, the keyword default followed by a colon, and one or more statements. When the conditions of the specified case labels in the switch statement do not hold, the default clause is chosen.
In OSI, the set of default configuration and initialization values supplied with OSI Communications Subsystem. The user can change the default configuration, which is provided by initial records supplied in the subsystem information base shipped with OSI Communications Subsystem.
default configuration directory (DCD)
The directory in which the default ODM object classes are stored, including application-specific object classes. See also active configuration directory, staging configuration directory.
default database client interface copy
See default IBM database client interface copy.
The method of delivering messages to a message queue without interrupting the job, and sending the system-assigned reply for any messages requiring a reply. Messages are placed on the message queue only if the message queue is QSYSOPR; otherwise, the messages are discarded by the system. For messages requiring a reply, replies are sent before the messages are discarded.
default device geometry
A part of the storage management subsystem (SMS) base configuration that identifies the number of bytes per track and the number of tracks per cylinder for the purpose of converting space requests made in tracks or cylinders into bytes. Default device geometry is used when no unit name has been specified.
default drawing attribute
In architecture, a drawing attribute adopted at the beginning of a drawing process and usually at the beginning of each root segment that is processed. See also current drawing attribute.
default drawing control
In architecture, a drawing control adopted at the start of a drawing process and usually at the start of each root segment that is processed. See also current drawing control, root segment.
Data file in which resource default values are stored in ASCII form to permit the assignment of alternative resource values at run time without need for rewriting or recompiling source code.
- A focal point that provides management services support for those nodes that have not been assigned a focal point. The set of nodes in the sphere of control (SOC) of a default focal point is not defined at either the focal point itself or the SOC nodes. A default focal point exchanges management services capabilities with all network nodes known to it; only those nodes that have not established a relationship with another focal point accept the request. See also assigned focal point.
- In SNA, a network node that receives alerts from nodes that do not have defined focal points. See also primary focal point.
- A QMF form that is created when a saved form is not specified on the RUN QUERY command.
- A temporary object that contains the description of the format of a printed or displayed report, which was built without explicitly specifying a form to be applied against it.
In RACF, the group specified in a user profile that is the default current connect group. See also current connect group.
default IBM database client interface copy (default database client interface copy)
The copy that applications requiring the use of the IBM Data Server Driver for ODBC and CLI and the IBM Data Server Provider for .NET use by default.
The initial value assigned to a data object by the compiler if no initial value is specified by the programmer. In C language, external and static variables receive a default initialization of zero, while the default initialization for auto and register variables is undefined.
- A part of the storage management subsystem (SMS) base configuration that identifies the management class for system-managed data sets that do not have a management class assigned.
- A management class that is assigned to a policy set. This class is used to govern backed up or archived files when a file is not explicitly associated with a specific management class through the include-exclude list.
The namespace that is applied if an XML element, type, or function has no namespace prefix. If the URI reference in a default namespace declaration is empty, unprefixed elements in the scope of the declaration are not considered to be in any namespace.
default network message queue
A message queue to which messages related to network activity are sent when either the user profile does not have a message queue specified or the message queue named in the user profile cannot be used.
A definition of an object (for example, a queue) with all attributes defined. If a user defines an object but does not specify all possible attributes for that object, the queue manager uses default attributes in place of any that were not specified.
A question that is asked of all applicants, regardless of the job applied for. See also knockout question.
A record that consists entirely of default values (numeric fields are filled with zeros; character fields are filled with blanks; and fields of either data type (numeric or character) can be filled with a value specified by the user with the DFT keyword in DDS).
default SSCP list
In VTAM, a list of system services control points (SSCPs) to which a session request can be routed when an LU's owning cross-domain resource manager (CDRM) is not specified. This list is filed as part of an adjacent SSCP table in the VTAM definition library.
default SSCP selection
A VTAM function that uses the default SSCP list to select a set of one or more system services control points (SSCPs) to which a session request can be routed when an LU's owning cross-domain resource manager (CDRM) is not specified.
default system control area (DSCA)
In MFS, part of the device output format (DOF) that causes specific terminal functions to be performed if the destination terminal has the required features. See also system control area.
A part of the storage management subsystem (SMS) base configuration that identifies an esoteric (such as SYSDA) or generic (such as 3390) device name. If a user omits the UNIT parameter in the job control language (JCL) or the dynamic allocation equivalent, SMS applies the default unit if the data set has a disposition of MOD or NEW and is not system-managed.
The user whose security attributes are used to protect CICS resources in the absence of other, more specific, user identification. For example, except in the case of terminals defined with preset security, the security attributes of the default user are assigned to terminal users who do not sign on.
default user pool
A storage pool that stores file data that SAN File System has not assigned (using the active policy set) to a user pool. There is only one default user pool; however, you can assign any user storage pool as the default pool. See also user pool.
- A predetermined value, attribute, or option that is assumed when no other value is specified. A default value can be defined for column data in DB2 tables by specifying the DEFAULT keyword in an SQL statement that changes data (such as INSERT, UPDATE, and MERGE).
- A value that is automatically assigned.
- A project element that allows stakeholders to track bugs and bug fixes.
- A type of change request that identifies an anomaly or flaw in a work product. See also change request.
deferred embedded SQL
SQL statements that are neither fully static nor fully dynamic. Like static statements, they are embedded within an application, but like dynamic statements, they are prepared during the execution of an application. See also dynamic SQL, incremental bind statement, static SQL.
deferred index cleanup rollout
A rollout in which index cleanup is performed after the deletion of the portion of the MDC table is complete. Deferred index cleanup rollout is significantly faster than immediate index cleanup rollout, but rolled-out blocks are not available for immediate reuse. See also rollout.
deferred printing mode
A printing mode that spools output through JES to a data set instead of printing it immediately. Output is controlled using job control language (JCL) statements. See also direct printing mode.
A restart performed by the system when a user resubmits a job. The operator submits the restart deck to the system through a system input reader. See also automatic restart, checkpoint restart.
- A work element created and placed on a chain (the DWE chain) to save information about an event that must be completed before task termination but that is not completed at the present time. DWEs are also used to save information about work to be backed out in case of an abend.
- The catalyst used to call event-driven services controlled within CICS. A DWE causes a unit of work to be scheduled later, normally at the end of the task or just before or after syncpoint.
A value that shows the cost savings that the system applied to an LTL shipment, based on weight breaks. If it will reduce the cost, the system returns the minimum charge from the next highest weight range.
defined user ID
See defined user identifier.
defined user identifier (defined user ID)
A user identifier (user ID) named on a DEFINE PROCESS or DEFINE ACTIVITY command. It specifies the user ID under whose authority the process or activity will be run, if it is activated by a RUN command.
defined zone configuration
The complete set of all zone objects that are defined in the fabric. The defined zone configuration can include multiple zone configurations. See also enabled zone configuration, zone configuration.
definite response (DR)
In SNA, a value in the response-requested field of the request header that directs the receiver of the request to return a response unconditionally, whether positive or negative, to that request. See also exception response, no response.
In a CICS resource, information about when, how, and by whom the resource was defined or last changed. See also resource signature.
In RPG, a specification used for data definitions. This specification includes defining the following: data structures, data-structure subfields, named constants, arrays, and stand-alone fields.
definitive media library (DML)
A logical representation of one or more locations where all quality controlled versions of all media configuration items (CIs) are held in their definitive form, together with any associated CIs such as license and other documentation.
The process of running a software utility to rewrite fragmented data to contiguous sectors of a computer storage medium to improve access and retrieval time. See also fragmentation.
- In NetDA/2, the maximum number of attachments (such as links, Ethernet connections, or token-ring connections) that a node can have. For example, if a node can have six attachments, that node has a degree of 6.
- A measure of how many direct relationships an entity has with other entities on an association chart. Degree is one of the centrality measures used in social network analysis. See also centrality, root entity.
- The number of children of a node.
degrees of separation
A measurement of the relationship between two entities. The measurement is a positive integer greater than zero that defines the minimum number of entities that are involved in a chain of relationships not including the root entity. For example, if two entities are related, those entities are 1-degree separated, and have a 1-degree relationship. See also relationship.
The act of breaking kits into individual components. Dekitting is performed on kits in inventory that are no longer required. For example, inventory left over from a seasonal promotion may be dekitted and the components can be used in other kits or sold individually.
See delete character.
delayed fallback timer
A timer that can be configured to let the resource group fall back to a higher-priority node at a specified date or on a recurring basis. The delayed fallback timer is an attribute of a resource group. See also resource group, resource group policies, settling time.
A method of logging changes to an access path for database files and applying the changes the next time the file is opened instead of rebuilding the access path completely or maintaining it immediately. See also immediate maintenance, rebuild maintenance.
A port that is enabled like a shared port except that the login herald is not displayed until you type one or more characters (usually carriage returns). A port directly connected to a remote system or intelligent modem is usually enabled as a delayed port.
In SNA, an operational mode in which the sender may continue sending request units on the normal flow after sending a definite-response request chain on that flow, without waiting to receive the response to that chain. See also delayed-response mode. See also immediate-request mode.
In SNA, an operational mode in which the receiver of request units can return responses to the sender in a sequence different from that in which the units were sent. An exception is the response to a CHASE request, which is returned only after all responses to requests that were sent before the CHASE have been returned. See also immediate-response mode.
A procedure used with some channel associated signaling protocols to indicate when a switch or PABX is ready to accept address signaling. After seizure, the switch sends off-hook until it's ready to accept address signaling, at which time it sends on-hook. See also immediate start, wink start.
- To assign all or a subset of manager privileges to a user. To designate a user to approve requests or provide information for requests for another user.
- A user who is authorized to work for another user.
A general resource that is eligible to be accessed by specially programmed applications that request RACF to check the daemon or application's authority for a resource when the client's authority is insufficient. See also nested accessor environment element.
- The process of propagating a security identity from a caller to a called object. According to the Java Platform, Enterprise Edition (Java EE) specification, a servlet and an enterprise bean can propagate either the client identity when invoking enterprise beans, or can use another specified identity as indicated in the corresponding deployment descriptor.
- The act of giving other users or groups the authority to perform operations.
- The act of an owner of a mail file allowing someone else to manage the mail file, for example, to send email on behalf of the owner.
A data authority that allows the user to remove entries from an object; for example, delete messages from a message queue or delete records from a file. See also add authority.
A row in the result of a SELECT statement of a cursor that no longer has a corresponding row in the base table because that row was deleted. The row for the SELECT statement is no longer accessible though the cursor. See also hole, update hole.
A trigger that is activated by a delete operation on the table or view that is specified in the trigger definition. See also insert trigger, instead of trigger, trigger, update trigger.
A truncated document that is left in a Notes database in place of the original document to indicate to the Replication task that the document should, in fact, be deleted from all other replicas.
A simple file format that consists of text separated into meaningful chunks by specific characters. The chunks of text are typically individual fields. The specific character is called a delimiter, and can be any character that is not found in the text. Comma and tab are common delimiters. If the delimiter is used as a character in the text, it must be enclosed by a pair of text qualifiers, usually double quotation marks.
- A character, such as comma or tab, used to group or separate units of text by marking the boundary between them.
- A flag that is formed by a character or a sequence of characters to group or separate items of data by marking the beginning and end of a unit of data. The delimiter is not a part of the flagged unit of data.
- To add changes to a stream, or make them available to be accepted into a stream.
- In source control management, to conduct an outgoing flow of change sets and baselines from a repository workspace to a stream or to another repository workspace.
- An output from a process that has a value, material or otherwise, to a customer or other stakeholder.
- Any measurable, tangible, verifiable outcome, result or item that must be produced to complete a project or part of a project. Often used more narrowly in reference to an external deliverable, which is a deliverable that is subject to approval by the project sponsor or customer.
deliverable acceptance certificate
This certificate is input for the phase exit review for the customer. Once signed by the customer's project development team leader (PDTL) and IGS's solution project manager (SPM), it confirms and identifies the completion of deliverables as specified in the statement of work (SOW) for that phase.
delivery-confirmation bit (D-bit)
In X.25 communications, the bit in a data packet or call-request packet that is set to 1 if end-to-end acknowledgment (delivery confirmation) is required from the recipient.
A constraint that lets the buyer take into account the delivery date proposed by a supplier when analyzing bids. By means of a delivery constraint, a buyer can set a range of acceptable dates for delivery, and assign a per day penalty for either late or early delivery.
A ClearCase operation in which developers merge the work from their own development streams to the project's integration stream or to a feature-specific development stream. If required, the deliver operation invokes the Merge Manager to merge versions.
Delivery Project Executive (DPE)
A lead delivery representative who is responsible for all delivery aspects of a contract including customer satisfaction, delivery excellence, account growth, and profit attainment, with service delivery as the primary responsibility.
A service typically provided by selling organizations for products that are heavy, oversized or fragile and cannot be transported by common carriers. These products may also require special handling which requires special equipment or personnel.
- Data or other content that has changed since a previous benchmark.
- A difference, or an incremental value, between two instances.
A copy of all database data that has changed since the last successful backup (full, incremental, or delta) of the table space in question. A delta backup is also known as a differential, or noncumulative, backup image. The predecessor of a delta backup image is the most recent successful backup that contains a copy of each of the table spaces in the delta backup image.
delta business object
A business object used in an update operation. Such a business object contains only key values and the values to be changed. See also after-image.
delta channel (D-channel)
In ISDN, a common channel used for signaling and management of the network. In a basic rate interface, the D-channel operates at 16 kilobits per second. In a primary rate interface, the D-channel operates at 64 kilobits per second. See also bearer channel.
See delta encoding.
Deployment of only that data that is required to transform a current runtime environment into a target runtime environment. See also full deployment.
A way of storing or transmitting data in the form of differences between sequential data rather than in the form of complete files. See also data deduplication.
delta index build
In an enterprise search system, the process of adding new information to an existing index. See also main index build.
The process of creating the software package that contains only the delta between the base software package and the software package to be installed. See also byte-level differencing.
A business item or unit that captures space class, space standard, functional role, worker type, and demand category into one record that provides insight into how spaces are classified. Demand drivers are used in forecasting for capacity and size.
See corrective maintenance.
The process that is used to respond to an out-of-space condition on a file system for which hierarchical storage management (HSM) is active. Files are migrated to server storage until space usage drops to the low threshold that was set for the file system. If the high threshold and low threshold are the same, one file is migrated. See also automatic migration, selective migration, threshold migration.
The conversion of mangled C++ names back to their original source code names to make program debugging easier. See also mangling.
- To remove a logical data unit from cache memory. A storage server demotes a data unit to create space for other logical data units in the cache or because the logical data unit is not valid. The ESS must destage logical data units with active write units before they can be demoted.
- To move an object to an earlier state or version, for example, to demote a major version with the status "released" into a minor version with the status "in process." In this case, the status of the previous major version is changed from "superseded" to "released."
denial-of-service attack (DoS)
In computer security, an assault on a network that brings down one or more hosts on a network such that the host is unable to perform its functions properly. Network service is interrupted for some period.
The intentional duplication of columns in multiple tables to increase data redundancy. Denormalization is sometimes used to improve performance. See also normalization.
To put normalized data in a physical location and structure that is optimized for performance and data analysis. See also normalize.
See subnormal number.
A dimension in a multidimensional database that has a high probability for occupying one or more data points in every combination of dimensions that occurs. For example, in a typical multidimensional database, the measures dimension is dense since it contains accounts data (for example, quantity sold, cost of goods sold, and so on) and since accounts data exists for virtually all products in all markets. See also sparse dimension.
dense wavelength division multiplexing (DWDM)
A technology that places many optical signals onto one single-mode fiber using slightly different optical frequencies. DWDM enables many data streams to be transferred in parallel.
- A requirement that one managed resource has on another managed resource in order to operate correctly.
- A relationship that allows a module to use artifacts from a library or that allows a process application to use artifacts from a toolkit. A toolkit can also have a dependency on another toolkit.
- A prerequisite that must be satisfied before a job or job stream can start. See also follows dependency, resource dependency.
- A link between interrelated projects activities. Activities with these links depend on the start and finish dates of at least one other element and therefore cannot be completed without taking the other into consideration.
- A contingency between groups, where one requires some form of support from the other to achieve a result. For example, a brand may have a dependency on information systems to provide the capability for the direct sales force to price and order a new offering if the brand's promise of value cannot be fulfilled without this support.
- A relationship between two operations in which the status or the return code of the first operation determines the starting of the second operation. See also external dependency.
- A file, such as a copybook or an include file, that is required for a COBOL or PL/I program to compile properly.
A build definition that saves time and system resources by only building artifacts that need to be rebuilt based on what has changed since the last successful build. Changes to a program's source or dependencies, and deletion or modification of a program's output will be detected and cause the program to be rebuilt.
In UML modeling, a relationship in which changes to one model element (the supplier) impact another model element (the client). See also realization relationship.
- An Ada-language compilation unit that requires recompilation if another unit were to be recompiled because of the compilation order imposed by the Ada language.
- In SQL, an object (row, table, or table space) that has at least one parent. See also parent table space.
The file in a constraint relationship that contains the foreign key. See also parent file.
dependent immediate materialized query table
A table whose definition is based on the result of a query and whose data is in the form of precomputed results. These results come from the tables or nicknames that are used in the definition of the materialized query table.
dependent logical unit (DLU)
A logical unit that requires assistance from a system services control point (SSCP) to instantiate an LU-to-LU session. See also independent logical unit.
dependent logical unit requester (DLUR)
An advanced program-to-program communications (APPC) application that allows dependent secondary logical units (LU 0, 1, 2, and 3) an entry point into the Advanced Peer-to-Peer Networking (APPN) network. DLUR support gives the appearance of having an adjacent connection to VTAM, but allows traversing the APPN network through intermediate nodes.
dependent LU requester (DLUR)
An APPN end node or network node that (a) owns dependent LUs in its local node or in adjacently attached nodes and (b) obtains SSCP services for these dependent LUs from a dependent LU server (DLUS) located elsewhere in an APPN network. The flows of SSCP services between DLUR and DLUS are encapsulated in APPN formats and carried over a special pair of LU 6.2 sessions (referred to as a CP-SVR pipe).
- In a multi-MVS configuration, a region that receives commands from a master or coordinator region at takeover time. It cannot initiate a takeover.
- An address space, managed by the IMS control region, where IMS application programs run. Dependent region types are MPP, BMP, IFP, JMP, and JBP.
dependent resource groups
A relationship between two or more resource groups that can be specified to control the timing of events or the location of the resource groups. Clusters with dependent resource groups allow multitiered applications to be included in resource groups. See also active configuration directory, child resource group, location dependency, multitiered application, parent resource group, resource group, resource group policies.
A row that contains a foreign key that matches the value of a parent key in the parent row. The foreign key value represents a reference from the dependent row to the parent row. See also parent row.
In a database, a segment that relies on a higher-level segment for its full hierarchic meaning. A child is a dependent segment of its parent. See also root segment.
dependent service element (DSE)
An element of the active IMS system that has a counterpart in the alternate IMS system, but cannot trigger a takeover on its own. z/OS, VTAM, IRLM, and the CPC are DSEs. A DSE depends on IMS to recognize a failure in its processing and request that the alternate take over its operation.
A table that is a dependent of an object. For example, a table with a foreign key is a dependent of the table containing the corresponding primary key. See also descendent table, parent table.
- To make a HATS application ready for use on the server, using functions in WebSphere Application Server, after transfer has taken place. See also transfer.
- In Web Experience Factory, to create a WAR file for an application and install the WAR on the target server for execution by users.
- To place files or install software into an operational environment. See also undeploy.
- To send content to one or more endpoints for execution to accomplish an operation or task, for example, to install software or update a patch.
- To make operational the configuration and topology of the broker domain.
- To place files or install software into an operational environment. In Java Platform, Enterprise Edition (Java EE), this involves creating a deployment descriptor suitable to the type of application that is being deployed.
- To place or install an asset into an operational environment.
A manageable object that exists in an IT environment, such that its presence can be verified (for example, by using a discovery tool). See also authorized asset.
deployed JAR file
A generic term for a file produced from the EJB JAR file. It contains the XML deployment descriptor and enterprise bean classes from the EJB JAR file, plus additional classes generated to support the chosen EJB container.
- The process of moving an application (such as a report or model) to a different instance. For example, reports are often created in a test environment and then deployed to production. When an application is deployed, it is exported, transferred, and imported.
- The process of making WebSphere Commerce application code available for use. This process includes packaging customized commands, data beans, and enterprise beans into JAR files. The JAR files must then be installed and configured within a container.
- Information about content sent to one or more endpoints, a specific instance of sent content.
- A process that retrieves the output of a build, packages the output with configuration properties, and installs the package in a pre-defined location so that it can be tested or run. See also stage.
- The process of reconfiguring and reallocating resources in the managed environment. Deployment occurs in response to deployment requests, created manually by administrators or automatically by the system.
- The process of enabling the widespread use of a predictive analytics project within an organization.
- A process that installs an operating system, and possibly other applications and files, on a target computer. During a deployment, data previously stored on the hard drives of the target is deleted.
- The act of packaging enterprise beans into a JAR file for distribution to a container on an enterprise bean server.
- The process of transferring rules from a local development environment into an operational, or runtime, environment.
- The process of installing and configuring a software application and all its components. See also cloud deployment, on-premises deployment.
Additional code that enables bean implementation code written by an application developer to work in a particular EJB runtime environment. Deployment code can be generated by tools that the application server vendor supplies.
An XML file that describes how to deploy a module or application by specifying configuration and container options. For example, an EJB deployment descriptor passes information to an EJB container about how to manage and control an enterprise bean.
- The directory containing the subdirectories and resource files created during customization.
- The directory where the published server configuration and web application are located on the machine where the application server is installed.
A collection of configured clusters, servers, and middleware that collaborate to provide an environment to host software modules. For example, a deployment environment might include a host for message destinations, a processor or sorter of business events, and administrative programs.
deployment evaluation framework (DEF)
A customizable framework that includes a survey that helps a development team learn best practices, make mid-course decisions, and share experience reports, in an agile development project.
The collection of actions created when an operator selects more than one action for a deployment, or a baseline is deployed. See also baseline, component, deployment window, multiple action group.
Person responsible for ensuring the ability to deploy and enabling the execution of the re-engineered business processes and transformation solutions across all the geographies, business units, and functional lines.
The Tivoli management discipline that addresses the automation of configuration and change management activities for the ever-evolving components of a network computing system. See also availability management, operations and administration, security management.
- A WebSphere Application Server configuration profile that manages the nodes and clusters within a cell.
- A server that manages and configures operations for a logical group or cell of other servers. See also subprocess.
- A web server used to install components and to ensure that the components are configured to communicate correctly with one another.
A file that contains project-level information, case-level data, or both that is created by one operator for transfer to another operator that will load the file onto their copy of Interviewer.
A phase that includes a combination of creating the hosting environment for your applications and the deployment of those applications. This includes resolving the application’s resource dependencies, operational conditions, capacity requirements, and integrity and access constraints.
- A list of resources, configurations, and implementations required to realize the deployment of an application.
- A template of a virtual service definition.
- The segments and segment-related tasks in a deployment.
- A policy that modifies the domain or service configuration at deployment time to accommodate the environment in which the appliance operates.
- A policy that associates a specific bay in a BladeCenter chassis with a Remote Deployment Manager (RDM) noninteractive task. When a blade server is added to or replaced in the bay, IBM Director automatically runs the RDM task.
- An optional way to configure an eXtreme Scale environment based on various items, including: number of systems, servers, partitions, replicas (including type of replica), and heap sizes for each server.
A specific type of task template that contains parameters for customizing a deployment on a target, and the target display screen layout. See also task template.
A setting in the deployment manager that determines the rules of deployment. For example, if a highly available Case Management Client application is being deployed, the deployment scope in the deployment manager must be changed.
A definition of what objects to move (deploy) between a source and target environment, the deployment preferences, and the archive name. Deployment specifications are used for import and export.
- One of several states that a service level agreement (SLA) goes through after it is submitted.
- The eligibility of a deployment to run on endpoints; includes any parameters set by the operator, such as “Start at 1AM, end at 3AM.”
The period during which a deployment’s actions are eligible for execution. For example, if a Fixlet has a deployment window of 3 days and an eligible device that has been offline reports in to BigFix within the 3-day window, it gets the Fixlet. If the device comes back online after the 3-day window expires, it does not get the Fixlet. See also deployment group.
See deployment phase.
A term that is no longer approved for use. Typically, deprecated terms are replaced with a new term or a synonym. See also replaced by term.
To remove a service or component. For example, to deprovision an account means to delete an account from a resource. See also provision.
- In Enhanced X-Windows, the number of bits per pixel for a window or pixmap.
- The number of clicks required for a user, or an automatic crawler, to get from a source page to a target page.
To remove items from a queue. See also enqueue.
See Distinguished Encoding Rules.
- In the C and C++ languages, to apply the unary operator * to a pointer to access the object the pointer points to. See also indirection.
- In VisualAge RPG, to remove information specific to the System i platform from a control.
In the hierarchical file system, to remove an underlying file system and the specific functions it supports from the application programming interface layer and to make it unavailable to user applications.
- A morphological process used to produce additional words from a canonical base form, for example: compute, computer, computerize, and recomputed.
- In a data source or DataStream, a value that is calculated rather than obtained directly from the source data, using an expression defined by the user.
- In object-oriented programming, the refinement or extension of one class from another.
- The process of deriving a C++ class from an existing class, called a base class.
An attribute that represents a specific aspect of another attribute. Multiple derived attributes can be defined for an attribute and these derived attributes can be assigned to different categories.
See base class.
Data that is produced by applying calculations to input data at the time the request for that data is made (that is, the data has not been pre-computed and stored in the database). See also pre-calculated data.
See synthetic event.
- A variable that does not exist in a data source and is created from one or more existing fields, even across different data sources.
- A field that is calculated or inferred from other fields or data, such as the calculation of a customer ID by using the @INDEX sequence function in CLEM.
An order that is created as a result of a parent order's necessity to communicate some portion of the order fulfillment execution to a third party. Once created, the derived order no longer maintains a reference to the parent order. Its lifecycle is independent.
A variable that is created from other variables by using an expression. For example, numeric derived variable can be created to show the sum of the values that are stored in two or more other numeric variables.
See Data Encryption Standard.
A type of encryption algorithm that requires a client to send credentials (name, conversation key, window key, and a time stamp) to the server. The server then returns a verifier to the client. Data Encryption Standard (DES) credentials are sometimes called secure credentials because they are based on a sender's ability to encrypt data using a common time reference; a randomly generated key is required to encrypt a common reference time that is then used to create a conversation key.
- A dependent foreign key table of a given table.
- A dependent foreign key table of a descendent foreign key table of a given table. See also dependent foreign key table.
- A dependent materialized query table of a given table.
- A dependent materialized query table of a descendent foreign key table of a given table.
- A dependent staging table of a given table.
- A dependent staging table of a descendent foreign key table of a given table.
A table that has a dependent relationship on a parent table or on another descendent table. See also dependent table.
The part of lowercase letters (such as y, p, and q) that descends below the baseline of the other lowercase letters. In some typefaces, the uppercase J and Q also descend below the baseline. See also ascender.
- The distance from the character baseline to the bottom of a character box. For both bounded-box fonts and unbounded-box fonts, the descender depth is the number of pels between the bottommost toned pel and the character baseline, including the bottommost toned pel. The value may differ for different characters in a given font. A negative value for descender depth signifies that all of the character box is above the character baseline. See also ascender height.
- The character shape's most negative character coordinate system Y-axis value.
The values by which data is arranged from the highest value to the lowest value of the key field, in accordance with the rules for comparing data items. See also ascending key.
descending key sequence
The arrangement of data in order from the highest value of the key field to the lowest value of the key field. See also ascending key sequence.
The arrangement of data in order from the highest value to the lowest value, according to the rules for comparing data. See also ascending sequence.
An additional description for an item. Descriptive attributes are not used for SKU resolution. See also defining attribute.
User-written text that describes the operation. This text is also issued as part of the write-to-operator message if the operation has been started, exceeds its deadline, and has the deadline write-to-operator (WTO) option specified.
- In the DCE X/Open Directory Service, a defined data structure that is used to represent an OM attribute type and a single value.
- In Informix, a quoted string or variable that identifies an allocated system-descriptor area or an SQLDA structure. See also identifier, system-descriptor area.
- In information retrieval, a parameter word used to categorize or index information.
- In ODM, a named and typed variable that defines a single characteristic of an object.
- In Enterprise Service Tools, a property or characteristic of an instance of structured data that is a component of a screen description. At build time, these descriptors are used for screen matching. The descriptors are also used for screen recognition purposes in the deployed service.
- In DCE X/Open Object Management, the means by which the client and service exchange an attribute value and the integers that denote its representation, type, and syntax.
- A small, unsigned integer that a UNIX system uses to identify an object supported by the kernel. Descriptors can represent files, pipes, sockets, and other I/O streams.
- A template from which an IMS control block is built.
- See UIMA descriptor.
- An XML file that describes the content of a component or resource.
- See screen recognition criteria.
- A PL/I control block that holds information such as string lengths, array subscript bounds, and area sizes, and is passed from one PL/I routine to another during run time.
A method for converting a serialized variable into object data. See also serializer.
- In XDR, to change from XDR format to a particular machine representation.
- To reconstruct an object from serialized data. See also serialize.
- To change from serial-by-bit to parallel-by-byte.
See directory entry service.
designated approving authority (DAA)
The official who has the authority to accept the security safeguards for an information system. The DAA may be responsible for issuing an accreditation statement that records the decision.
designated gateway SSCP
See designated gateway VTAM.
- A router that informs end nodes of the existence and identity of other routers. The selection of the designated router is based upon the router with the highest priority. When several routers share the highest priority, the router with the highest station address is selected.
- In a multiaccess OSPF network that has at least two attached routers, a router that is responsible for generating link-state advertisements (LSAs) for the entire multiaccess network and determines which routers should become adjacent. A designated router is elected by other routers using the Hello Protocol. See also backup designated router.
One of several components that authorized users can run to create reusable, generally available searches, workflow definitions, workflow subscriptions, and templates for searching, publishing, and document entry. Site preferences control access to the designers.
An access level with which users can compose, read, and edit any documents, plus modify the database icon, About and Using documents, and all design elements. Servers can replicate all of the above and, if they have delete access, deletions.
A measurement (metric) that describes the characters in a font, or the recommendations of a font designer. Examples are height, width, and character increment for each character of the font uppercase height and maximum baseline extent for the font as a whole.
A scheme for refining the subsystems or components of a software system, or the relationships between them. A design pattern describes a commonly recurring structure of communicating components that solves a general design problem within a particular context.
The size of the unit Em for a font. All relative font measurement values are expressed as a proportion of the design size. For example, the width of the letter I can be specified as one-fourth of the design size.
A Notes database design that lets users share design elements among databases and store design elements with a template. The template can be enabled so that when it changes, the change automatically occurs in all databases created with that template.
A process for envisioning the user experience that involves diverging and converging on solutions. IBM Design Thinking adds three core practices (hills, sponsor users and playbacks) to the design thinking methods.
Desktop Management Interface (DMI)
A protocol-independent set of application programming interfaces (APIs) that were defined by the Distributed Management Task Force (DMTF). These interfaces give management application programs standardized access to information about hardware and software in a system.
desktop publishing (DTP)
The process of producing high-quality documents from a personal computer or workstation with associated software. These systems are usually intended for stand-alone, single user environments.
See Data Exchange SPI architecture.
See destination identifier.
- A queue of data used with the CICS transient data facility.
- A copy group or management class attribute that specifies the primary storage pool to which a client file will be backed up, archived, or migrated. See also copy storage pool.
- An exit point that is used to deliver documents to a back-end system or a trading partner.
- The location or end point of a delivery.
- An end point to which messages are sent, such as a queue or topic.
- In JMS, an object that specifies where and how messages should be sent and received.
- In IMS Transaction Manager (TM), an application program, a logical terminal, or an operator command that is associated with the control region.
- See event destination.
- Any point or location, such as a program, node, station, printer, or a particular terminal, to which information is to be sent. See also origin.
The location to which information is to be sent. See also source address.
destination address field (DAF)
In SNA, a field in a format identification 0 or format identification 1 transmission header that contains the network address of the destination. In a format identification 2 header, the field is called destination address field prime (DAF'). See also origin address field.
A numeric code used to categorize information that is sent from a user address space to the global address space, or between the global and a local address space. A destination code can correspond to either subsystem interface function codes or internal JES3 communication.
destination control table (DCT)
A table describing each of the transient data destinations used in CICS. This table contains an entry for each extrapartition, intrapartition, and indirect destination.
- The disk to which a program is installed.
- An available disk to which data can be written.
See destination identifier.
- The 3-byte destination ID of the destination device, in the 0xDomainAreaALPA format.
- The 8-character subscript on the DESTID initialization statement or command that corresponds to a combination of a first-level destination and a second-level destination that determines where data should be sent in a JES2 installation. A DESTID can be either a symbolic destination or an explicit destination. See also explicit destination, symbolic destination.
- The node to which a request or data is sent.
- In the OSI Communications Subsystem licensed program, a node that is the final recipient of data sent by the local node and the origin of data sent to the local node. A destination node may or may not be an adjacent node.
- In OSI, a service access point used to receive data.
- In SNA and TCP/IP, a logical address that allows a system to route data from a remote device to the appropriate communications support. See also source service access point.
- In an IMS multisystem environment, the system in which the logical destination resides.
- In SNADS, a system that can receive messages, documents or objects.
destructive data change
An event in which data is modified by a change operation in an application or by a trigger, and then the data is modified again by other trigger actions within the same trigger.
A special member function of a class with the same name as the class with a ~ (tilde) preceding the name. You cannot specify arguments or a return type for this function. A destructor "cleans up" after an object by doing such things as freeing any storage that was dynamically allocated when the object was created.
- In cross-site mirroring, to disassociate a mirror copy from the production copy to use the mirror copy for a separate operation, such as to save data, to run reports, or to perform data mining. Detaching a mirror copy suspends geographic mirroring.
- To de-couple an inbound identity from an entity and verify again that it should still be associated with that entity.
- In a multithreaded environment, to mark a thread so that the system reclaims the thread resources when the thread ends. If the thread is already ended, the resources are freed immediately.
detached data partition
A data partition that is detached from a table but remains part of the table pending the completion of asynchronous index cleanup or integrity processing on dependent tables. Data in detached data partitions is unavailable to SQL statements. See also visible data partition.
In a table with indexes, an index that uses a fragmentation strategy that is different from the table fragmentation. See also attached index.
See leaf member.
- A record that contains the daily activities or transactions of a business. For example, the items on a customer order are typically stored in detail records. See also header record.
- In RPG, an output record produced during the detail output operation of the RPG program cycle. See also total record.
In Query, a report that contains all the information produced by a query. See also summary report.
A set based on an item and its immediate details. See also set.
A standard contents view in which a small icon is combined with text to provide descriptive information about an object. The text is arranged in rows and columns so one row is for each object and one column is for each type of descriptive information displayed.
That part of the RPG program cycle in which calculation and output operations are performed for each record read. See also total time.
detected access transmission error in (DTSE in)
In Performance Tools, the number of times the network termination 1 (NT1) notifies the terminal equipment (TE) of an error in data crossing the U interface of the integrated services digital network (ISDN) from the line transmission termination (LT) to the NT1. The NT1 reports the errors to the TE through the maintenance channel S1.
detected access transmission error out (DTSE out)
In Performance Tools, the number of times the network termination 1 (NT1) notifies the terminal equipment (TE) of an error in data crossing the U interface of the integrated services digital network (ISDN) from the NT1 to the line transmission termination (LT). The NT1 reports the errors to the TE through the maintenance channel S1.
A word that qualifies the noun with respect to its reference in context or the quantity. In English, determiners may include articles ('a'; 'the'), quantifiers ('all'; 'some'), demonstratives ('this'; 'that'), possessive pronouns ('my'; 'your'), and cardinal numbers ('one'; 'two').
A dictionary in which for a given input character you have only one transition path out of a node. Some languages require this capability to represent their vocabulary in a compact way. See also non-deterministic dictionary.
Deutsches Institut für Normung (DIN)
The German national standards-setting organization. DIN sponsors and publishes standards deemed relevant to German interests, performs conformance tests, and certifies products. DIN is also very influential internationally, particularly in electrical and ergonomic standards.
See device description.
- A decision management user role that is responsible for implementing the rule applications.
- In a document copying machine, a solution or material that is used to make the latent image visible.
- In printers, the unit in the process assembly that supplies a flow of developer mix (toner) over the photoconductor to develop the electrostatic image.
developer gateway system
A machine used by developers, domain experts, and others to make changes to the underlying system code. Developer gateway systems are a set of reserved compute nodes and have access to the shared file system.
Developer Kit for Java
See IBM Developer Kit for Java.
See integration test environment.
A business glossary that contains only the categories and terms that are being created or revised as part of a configured workflow and that have not been published yet. See also published glossary.
An object that determines which versions of elements appear in a development view and maintains a list of a developer's activities. The development stream configures the development view to select the versions associated with the foundation baselines plus any activities and versions that developers create after they join the project or rebase their development stream.
A DirectTalk system that is not used to respond to or make 'live' calls; it is used only to develop and test applications. See also production system.
- A temporary variation in the quantity of a special resource.
- An optional data structure that can be used to store the standard variations of the values for the selected event over the preceding four-week period.
- In the AIX operating system, a valuator, button, or the keyboard. Buttons have values of 0 or 1 (up or down); valuators return values in a range, and the keyboard returns ASCII values.
- An endpoint, for example, a laptop, desktop, server, or virtual machine managed by BigFix; an endpoint running the BigFix Agent.
- An asset, system, or component that can be tracked. This can include everything from cell phones to coffee makers, washing machines, headphones, lamps, wearable devices, and more. A device can also be a component of a machine, such as a jet engine of an airplane or the drill of an oil rig.
- See infrastructure.
- A piece of equipment such as a workstation, printer, disk drive, tape unit, or remote system.
- See mobile device.
- A component that is used for an event provider to provide location, notification, or telemetry data. Devices always belong to a hub and can be grouped in device groups.
- A piece of telecommunication equipment such as a cell phone.
device adapter (DA)
A physical component of the ESS that provides communication between the clusters and the storage devices. Multiple DAs are connected to the clusters in such a way that any cluster can access storage device via multiple paths, providing fault tolerance and enhanced availability. See also loop, SSA adapter.
A storage device classification used by the storage management subsystem (SMS). The device categories are: SMS-managed direct access storage device (DASD), SMS-managed tape, DASD not managed by SMS, and tape not managed by SMS.
device characteristics table (DCT)
An MFS table that is generated for IBM 3270 or SLU type 2 devices with symbolic names. An entry is generated for each symbolic name and its associated screen size and physical terminal features. Different combinations of features for the same symbolic name cause separate entries in the table to be created.
- A named set of characteristics that are applied to a group of storage devices. Each device class has a unique name and represents a device type of disk, file, optical disk, or tape.
- The generic name for a group of device types. For example, all display stations belong to the same device class. See also device type.
device cluster resource group
A cluster resource group that contains a list of switchable devices, such as independent disk pools which reside on a switchable entity. See also switchable entity.
The physical placement of display stations, printers, and so forth; and the configuration descriptions that describe the physical configuration to the system and describe how the configuration will be used by the system.
- For a server, a file that contains information about defined device classes, and, on some servers, defined libraries and drives. The information is a copy of the device configuration information in the database.
- For a storage agent, a file that contains the name and password of the storage agent, and information about the server that is managing the SAN-attached libraries and drives that the storage agent uses.
A component of the configurable service for a MedicalDeviceInput node that defines the connection that is used by a medical device. The device connection specifies the connection parameters and measurement set that are used by the device, and the device type.
Data that is used to identify the location of a device. This data can include geographical coordinates, WiFi access points, and timestamp details. See also trigger.
The reliance on the characteristics of particular types of devices used in writing and running programs or in performing functions. See also device independence.
Pertaining to a function that can be accomplished, or a program that can be run, only if particular types of devices are available. See also device-independent.
device description (DEVD)
An object that contains information describing a particular device or logical unit (LU) that is attached to the system. A device description is a description of the logical connection between two LUs (local and remote locations).
A collection of cluster nodes that share device resources, such as independent disk pools. For independent disk pools, the resources are: virtual addresses, disk pool numbers and disk unit numbers. An independent disk pool can only be accessed by the nodes in one device domain.
- A collection of workflows that implement logical device operations for a specific device or data center asset.
- A program that provides an interface between a specific real or virtual device and the application program that uses the device.
See device pooling.
One of several types of the system object type *FILE. A device file contains a description of how data is to be presented to a program from a device or how data is to be presented to the device from the program. Devices can be display stations, printers, diskette units, tape units, or remote systems.
A group of devices that are interchangeable as far as z/OS allocation is concerned. Unless a request is made for a specific device name, any device in a given device group can satisfy a request if one device in that device group can satisfy that request.
The capability to write and run programs or perform functions without regard for the physical characteristics of devices. See also device dependence.
Pertaining to a function that can be accomplished, or a program that can be executed, without regard for the characteristics of particular types of devices. See also device-dependent.
Device Management Enablement (DME)
See also water.
- In a Content Manager system, the interface between the resource manager and one or more physical devices.
- For complex interfaces, a collection of routines that acts as an intermediary between drivers and virtual machines. For example, supervisor calls from a virtual machine are examined by a device manager and routed to the appropriate subordinate device drivers.
- The subcomponent of PSF that manages the interface to the printer.
device mapping file
A configuration file that defines the configuration of the SPUs and the disks within a system, specific to the model type of the system. The device mapping file is used to create and initialize the Netezza database the first time the system starts. It also communicates the device mappings to the SPUs when Netezza starts or after a topology change such as a SPU failure.
- The symbolic name of an individual device.
- A name reserved by the system or a device driver that refers to a specific device. For example, the DOS device name for the parallel port is LPT1.
device parity protection
A function that protects data stored on a disk-unit subsystem from being lost because of the failure of a single disk unit in the subsystem. When a disk-unit subsystem has device parity protection and one of the disk units in the subsystem fails, the subsystem continues to run. The disk-unit subsystem reconstructs the data after the disk unit is repaired or replaced. See also checksum protection, mirrored protection, Redundant Array of Independent Disks.
A pool of devices (called a fence) that is used exclusively by a set of jobs in a specific job class. Using device partitioning, the device usage of an installation can be tailored to its anticipated workload.
Information about a device collected by BigFix, including details about its hardware, operating system, network status, settings, and BigFix client. Custom properties can also be assigned to a device.
A determination of whether a piece of BigFix content applies to applies to a device, for example, where a patch should be applied, software installed, or a baseline run. See also content relevance.
Defines a device attached to a queue in the print spooling system. A device stanza contains all information pertaining to the device (usually a printer) and is found in the /etc/qconfig file.
A class that distinguishes devices within the same functional class. It is used to indicate different interfaces. For example, the printer class has three subclasses: rs232, rs422, and parallel.
The generic name for a group of devices. See also device class.
device-type logical unit
In VTAM, a logical unit that has a session limit of 1 and usually acts as the secondary end of a session. It is typically a logical unit (LU) in an SNA terminal, such as a 3270.
device-version code page
In IPDS architecture, a device version of a code page contains all of the characters that were registered for the CPGID at the time the printer was developed since then, more characters might have been added to the registry for that CPGID. A device-version code page is identified by a CPGID.
See Data Export Wizard.
See decision federator.
See data flow control layer.
See dump utility program.
See dynamic transaction routing program.
See field definition macro.
See map definition macro.
See map set definition macro.
See sample statistics program.
See system initialization program.
See statistics utility program.
See device field.
See Data Facility Product.
See Data Facility Storage Management Subsystem.
See system-managed storage environment.
An IBM licensed program that provides the complementary functions of DFSMSdfp, DFSMSdss, DFSMShsm, and DFSMSrmm, which, together with the Resource Access Control Facility (RACF), provide a system-managed, administrator-controlled, storage environment. Functions of DFSMS/MVS are included in z/OS.
DFSMS Network File System
See z/OS Network File System.
See Data Facility Sort.
See distributed function terminal.
See data file utility.
See DASD fast write.
See distributed host command facility.
See Dynamic Host Configuration Protocol.
See Diffie-Hellman Group Exchange.
See Document Interchange Architecture.
A mark indicating a change in the phonetic value of a character or a combination of characters. See also accent mark.
diacritical weight (DW)
In cultural sort, the weight of a character that is due to its diacritic component. For example, in French, é sorts before è. See also alphanumeric weight, case weight, indifferent weight, level 2, mark weight, special weight.
In z/VM, a programming mechanism that lets any virtual machine directly communicate with CP by way of the DIAGNOSE instruction. Specific interface codes let a virtual machine more efficiently request specific CP services.
In printers, the operational mode in which the printer can check itself in case of a malfunction. For example, when the IBM 3935 Advanced Function Printer is in diagnostic mode, it does not accept information from the attached controlling computer system. See also print mode, test mode.
A special table that contains information about integrity violations that were caused by the rows of a violations table. See also violations table.
- A computer input device that allows a user to set parameter values.
- To initiate a telephone call. In telecommunication, this action is performed to establish a connection between a terminal and a telecommunication device over a switched line.
- An input/output device that is used to input variables by way of thumbwheels.
See local language.
dialed number identification service (DNIS)
In telephony, a number supplied by the public telephone network to identify a logical called party. For example, two 800 numbers might both be translated to a single real telephone number. The DNIS is sent when the real telephone number is called to allow end users to distinguish which service is being called when a call arrives to the real number.
- In AIXwindows, a two-way text interface between an application and its user. The interface takes the form of a collection of widgets and gadgets, including a DialogShell widget, a BulletinBoard widget (or a subclass of a BulletinBoard widget or some other container widget), plus various children, including Label, PushButton, and Text widgets.
- A series of related inquiries and responses between a user and an application, similar to a conversation between two people.
- The recorded interaction between a user and the 3270 application that the user accesses. Users can record a dialog using the Record Dialog function in the 3270 terminal service recorder. A recorded dialog includes the keystrokes, inputs and outputs that move the user from one screen to another in the 3270 application.
A secondary window that solicits user input for a specific task or subtask. Common examples are the Print and Save As dialog boxes. Dialog boxes are modal; that is, they must be closed before the user can continue working in the window that launched the dialog box.
In the user interface manager (UIM), an element in a panel group that is used to pass data values between two programs or between a program and a user. The values for all dialog variables in a panel group are stored in a variable pool.
A numbering scheme that establishes the format (expected number and pattern of characters) for a telephone number. The dial string specifies how to interpret character sequences dialed by the user, and how to convert those sequences into a telephone number for an outbound call.
- A set of business model definitions that specify linguistic properties such as translation, plural form, and grammatical gender of one or more terms.
- A list of strings that are used to filter and improve the quality of text analytics results.
- In data compression, a table that associates words, phrases, or data patterns with shorter tokens. The tokens replace the associated words, phrases, or data patterns when a data set is compressed.
- A search application component that provides spelling suggestions when misspelled words are encountered in a query.
dictionary data section
One of the data sections of a CICS monitoring record written to SMF. The dictionary data section defines all the performance data that is being gathered or can be gathered during this CICS run.
See change-capture replication.
The process of supplying specific string labels to an entry for different uses. Authors can, for example, specify the context for an entry only when it is used in a cross-product master index. The context does not appear when the entry is in the single-product index.
Differentiated Services domain
A contiguous portion of the Internet over which a consistent set of Differentiated Services policies are administered. A Differentiated Services domain can represent different trust regions, different network technologies (such as cells or frames), different hosts, or even different routers.
Differentiated Services field
A six-bit field in the Internet Protocol (IP) header of a data packet that encodes the Differentiated Services code point. The field replaces the IPv4 IP header field, which is called type of service (ToS).
- A symbol that represents one of the nonnegative integers smaller than the radix.
- Any of the numerals from 0 through 9.
Pertaining to data in the form of digits. See also analog.
An electronic document used to identify an individual, a system, a server, a company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certification authority and is digitally signed by that authority. See also certificate authority certificate, user certificate.
- An i5/OS component that allows i5/OS to be a local Certificate Authority (CA) to create digital certificates that are used to ensure secure communications.
- An i5/OS option that registers certificates that are created on the system when it is acting as a certificate authority (CA). DCM can also be used to register certificates that other certificate authorities issue. DCM allows you to choose to associate a user's certificate with its user profile. DCM is also used to associate digital certificates with various applications so that these applications can use the Secure Sockets Layer (SSL) for secure communications.
- On i5/OS systems, the method of managing digital certificates and using them in secure applications on the iSeries server. Digital Certificate Manager requests and processes digital certificates from certification authorities (CAs) or other third-parties.
A dashboard that provides analytics across the digital client journey and financial tracking of business results. The digital dashboard enables data-driven decision making to accelerate digital business.
Digital Design System
A system that delivers a simplified and search-centric experience for ibm.com and enables automated services. It combines user interface (UI) design with an automated services architecture to deliver content and services to IBM category, solution, and product level pages.
A business tool that provides insight into the performance of digital platform, marketing, and sales. The funnel defines the steps and key performance indicators (KPIs) to advance a client’s progression along the client journey.
An image whose image data was sampled at regular intervals to produce a digital representation of the image. The digital representation is usually restricted to a specified set of values.
Any IBM or IBM Business Partner product or service that can be digitally delivered, used or consumed online or on the web. A digital offeringis often in the form of a free trial or freemium version.
Digital Offering Rep (DOR)
A brand-aligned representative who focuses on selling SaaS delivered products to all non-industry accounts. They are responsible for identification, progression, and closure.
Digital Services Group (DSG)
An end-to-end services group that provides the full spectrum of strategy, production, content development, interactive, analytics, and engagement capabilities to IBM teams. The DSG provides digital services and runs like an external agency, complete with service level agreements (SLA) commitments, market-driven financial models, and real world competitive pressures.
digital signal processing (DSP)
A set of algorithms and procedures used to process electronic signals after their conversion to digital format. Due to the specific mathematical models required to perform this processing, specialized processors are generally used.
Information that is encrypted with a private key and is appended to a message or object to assure the recipient of the authenticity and integrity of the message or object. The digital signature proves that the message or object was signed by the entity that owns, or has access to, the private key or shared-secret symmetric key.
digital signature algorithm (DSA)
A security protocol that uses a pair of keys (one public and one private) and a one-way encryption algorithm to provide a robust way of authenticating users and systems. If a public key can successfully decrypt a digital signature, a user can be sure that the signature was encrypted using the private key.
digital speech synthesizer
A device used with screen readers to portray what is on screen through sound. See also screen reader.
Digital Subscriber signaling System Number 1 (DDS1)
A signaling protocol used between ISDN subscriber equipment and the network. Carried on the ISDN D-channel. ITU-T recommendations Q.920 to Q.940 describe this protocol.
digital versatile disc (DVD)
An optical disc that has the same overall dimensions of a CD-ROM, but has significantly higher capacities than a CD-ROM. DVDs are also double sided, whereas CD-ROMs are single sided.
digital video disc
See digital versatile disc.
Digital Video Interactive (DVI)
An integrated video, audio, and graphics technology allowing all forms of data (full motion video, still images, graphics, and text) to be displayed from any digital source. DVI allows real-time compression and decompression as well as display of digital graphics and full-motion video with audio.
In COBOL, the amount of physical storage required to store a single digit. This amount can vary depending on the usage specified in the data description entry that defines the data item. If the data description entry specifies that the USAGE IS DISPLAY, then a digit position is synonymous with a character position.
See Domino Internet Inter-ORB Protocol.
See Shortest Path First.
- A data category that is used to organize and select monitoring context instances for reporting and analysis. Examples of dimensions are time, accounts, products, and markets. See also member.
- To compute the length, angle, or radius of elements on a drawing.
- A broad grouping of descriptive data about a major aspect of a business, such as products, dates, or locations. Each dimension includes different levels of members in one or more hierarchies and an optional set of calculated members or special categories.
- In System Manager, the interfaces that define guidelines, standards, services, and other interfaces for integrating systems management applications.
- In FD:OCA, each successive level of partitioning. Dimensions allow the addressing of specific parts of an array.
- A measure of spatial extent such as height, width or breadth, or depth. See also dimension line.
- A name and a value that together define a feature of a variant of a product.
- In multidimensional data, a structural attribute of a cube that organizes data to enable in-depth business analysis.
- The attribute of size given to arrays and tables.
- In Cognos Planning, a list of related items such as Profit and Loss items, months, products, customers, and cost centers, including calculations. The rows, columns, and pages of a cube are created from dimensions.
- A finishing item that consists of multiple lines and a piece of text. The lines indicate the distance or angle that is being dimensioned, and the text contains the computed entry of the lengths, angles, or radiuses of elements on a drawing.
See level attribute.
dimension block index
In multidimensional clustering, a block index that is automatically created for a particular dimension when the dimension is defined on an MDC table. This index is used to maintain the clustering of data along that dimension, together with the other dimensions defined on the table. See also composite block index.
A build that delivers data to describe a single business dimension, such as a product or a customer. A dimension build has a source dimension table, a hierarchy for the data, a target database, and a target table. See also build.
dimension delivery module
A delivery module used to deliver data, describing a single dimension, to a target data mart. See also delivery module.
An element in the transformation model that is used to give context to a measure element. For example, a Product_Number dimension element, gives context to a Quantity measure element.
- A row of dimension names that appears either along the top of the dimension map window or just below the Measures and Data Sources option buttons in the Show Scope window. See also dimension.
- A solid line with arrows at both ends and a dimension in the center that is used to define the measurement of a part feature.
A table that shows the Transformer model in rows and columns. The columns in a dimension map are, for example, the dimensions representing Dates, Products, and Sales Regions. The rows in a dimension map are the levels within the dimensions, for example, year, month, and day (for a time dimension) or continent, region, state, and city (for a geographical dimension).
- The representation of a dimension in a star schema. Each row in a dimension table represents all of the attributes for a particular member of the dimension. See also star join, star schema.
- A database table that augments the data in a base record table. For example, a dimension table might contain demographic information, product information, or purchase transaction details.
- A table that contains attributes used to constrain and group data when performing data warehousing queries.
A subset of a dimension used to create cubes that contain only selected aspects of the data represented by the complete model. For example, views based on specific countries or regions are a useful way of ensuring that users see only the data that is most relevant to them.
See dual inline memory module.
See Deutsches Institut für Normung.
See data interchange program.
direct access storage
A type of storage where information is stored or retrieved directly, without prior sequential searching. See also random access memory.
direct access storage device (DASD)
A device that allows storage to be directly accessed, such as a disk drive. See also random access memory.
direct argument passing
A method of passing arguments in which the value of the argument is included directly in the parameter list See also indirect argument passing.
A type of binding between network license servers and clients in which client applications locate license servers by means of a local text file that contains network addresses of the license servers.
direct call facility
A facility that permits calling without requiring the user to provide address selection signals; the network interprets the call request signal as an instruction to establish a connection to one or more predetermined data stations.
In Enhanced X-Windows, a class of color map in which a pixel value is decomposed into three separate subfields for indexing. One subfield indexes an array to produce red intensity values, the second indexes another array for blue intensity values, and the third for green intensity values. The RGB values can be changed dynamically. This is mutually exclusive to the Pseudocolor color map color.
An XQuery constructor that contains XML-like notation to construct element, attribute, document, text, processing-instruction, or comment nodes. See also computed constructor, constructor.
direct data set
A data set that has records in random order on a direct access volume. Each record is stored or retrieved according to its actual address or its address relative to the beginning of the data set. See also sequential data set.
In VTAM, the deactivation of a resource as a result of a deactivation command that specifically names the resource. See also automatic deactivation.
direct dependent segment
In a data entry database (DEDB), a segment that is chained from a root segment. A direct dependent segment is stored in either the root addressable portion or the overflow portion of a DEDB area.
direct dial in (DDI)
See direct inward dialing.
An LTL rating process in which the shipper receives a specified discount when the carrier delivers the freight directly from the origin to the destination. A direct route is typically shorter and costs more than an indirect route, in which the truck makes an interim stop at a carrier depot or service center. See also indirect discount.
A RACF command that is issued from a user ID on an RRSF node. It runs in the RACF subsystem address space on the same or a different RRSF node under the authority of the same or a different user ID. See also automatic command direction, command direction.
A connection between entities in which links that are in the same direction are represented as a single link on a chart. See also connection.
A relational operation in which all of the rows in one or both of the joined tables are rehashed and directed to new database partitions based on the join predicate. If all of the partitioning key columns in one table participate in the equijoin predicates, the other table is rehashed; otherwise (if there is at least one equijoin predicate), both tables are rehashed.
directed Locate search
See directed search.
directed maintenance procedure
See fix procedure.
A search request that is sent to a specific destination node. A directed search is used to verify the continued existence of the resource, and to obtain the routing information specific to the node.
direct inward dialing (DID)
A service of a local phone company (or local exchange carrier) that provides a block of telephone numbers for calling into a company's private branch exchange (PBX) system.
- An indicator of whether a specified calibration point is increasing or decreasing with respect to the reference point.
- The print direction of data on a logical page, line, or field. The ultimate reference point for all direction controls on a page is the hardware origin. Secondary and tertiary reference points are possible as well, allowing more than one print direction on a page.
- A statement that is used in an application configuration file to define a particular setting for the application.
- An instruction in a source program that guides the compiler in making the translation to machine language but is not itself translated into instructions in the object program.
- A control statement that directs the operation of a feature and is recognized by a preprocessor or other tool. See also pragma.
- A first-failure data capture (FFDC) construct that provides information and suggested actions to assist a diagnostic module in customizing the logged data.
See nonswitched line.
A session for which there is no referral information and no marketing program. Direct loads are started by a user typing in the URL directly, bookmarking the website, or by means of a local referral (a page internal to the website).
direct managed resource
A managed resource that is not enclosed in a hosting domain. A direct managed resource must be registered independently when it is installed. The root managed resource of a hosting domain is a direct managed resource. See also hosting domain, indirect managed resource.
direct memory buffer (DMB)
Local memory that is used to receive inbound data over an SMC-D link. The remote peer places TCP socket application data directly into the DMB that the local peer assigns to receive data for the TCP connection. The local peer then copies the data from the DMB into the receive buffer of the receiving socket application.
direct monitor handler
An exception handler that allows the application programmer to directly declare an exception monitor around limited high-level language source statements. For ILE C, this capability is enabled through the #pragma statement.
See IBM Director Agent.
See IBM Director Console.
Director Core Services
See IBM Director Core Services.
See IBM Director database.
See IBM Director environment.
See IBM Director extension.
See IBM Director Server.
Director Server service
See IBM Director Server service.
Director service account
See IBM Director service account.
- A file that contains the names and controlling information for objects or other directories.
- A collection of open systems that cooperate to hold a logical database of information about a set of objects in the real world.
- The DB2 for z/OS system database that contains internal objects such as database descriptors and skeleton cursor tables.
- In OSI, a repository of information about objects. As defined in the X.500 directory standards, a directory is both a repository of information and the set of services provided to enable its users to access the information in the repository.
- A table of identifiers and references to the corresponding items of data.
- In a hierarchical file system, a grouping of related files.
- A file containing a set of tables that store all product-specific object definitions created by the user for a site.
- In VM, a Control Program (CP) disk file that defines each virtual machine's typical configuration, including the user ID, password, dispatching priority, and other information.
- The part of a partitioned data set that describes the members in the data set.
- A Notes database created from the DA50.NTF template and used to configure Directory assistance.
- A Domino database that servers use to locate directories that are not the primary Domino directory.
directory-container storage pool
A storage pool that a server uses to store data in containers in storage pool directories. Data that is stored in a directory-container storage pool can use either inline or client-side data deduplication. See also cloud-container storage pool, container storage pool, container-copy storage pool, storage pool.
- An entry in the system distribution directory. A directory entry contains information about the user, such as user ID and address, system name, profile name, mailing address, and telephone number.
- A logical record in a program library directory that contains a member or alias name, a pointer to that member, and attributes of that member.
directory entry name
A means of identifying the directory entry of a named object to the coupling facility. The directory, all of its entries, and all of the objects associated with those entries are contained in a single structure.
directory entry service (DE service)
A function that manages directory entries in partitioned data sets (PDSs) and partitioned data sets extended (PDSEs). DE services can be used by unauthorized as well as authorized programs.
directory manager domain
A CICS domain that provides resource-table lookup services for CICS Transaction Server for z/OS components such as transaction manager, program manager, and user domains. The resource definitions for which the directory manager domain provides services are transaction definitions, remote transaction definitions, transaction classes, TPNames, user attributes, programs, BMS mapsets, and BMS partition sets.
directory model ACL
See directory default ACL.
The valid attribute types and object classes that can appear in a directory. The attribute types and object classes define the syntax of the attribute values, which attributes must be present, and which attributes may be present for the directory.
See IBM Tivoli Directory Server for i5/OS.
- A component that provides naming, object storage, and lookup capabilities to other components.
- In APPN, a component that is responsible for maintaining a directory of SNA logical units, along with information about those LUs’ locations and availability.
- A directory of names, profile information, and machine addresses of every user and resource on the network. It manages user accounts and network permissions. When a user name is sent, it returns the attributes of that individual, which might include a telephone number, as well as an email address. Directory services use highly specialized databases that are typically hierarchical in design and provide fast lookups.
- A facility such as Lightweight Directory Access Protocol (LDAP) or Microsoft Active Directory that provides information about users and groups in an organization.
- In OSI, the service by which an open system can access directory information. Directory service can be provided locally within an open system, or it can be obtained from another open system using the directory service protocols defined by ISO/CCITT. In OSI Communications Subsystem, directory service is used to obtain the presentation address and other attributes of application entities.
The capability of a system to duplicate Enterprise Address Book (EAB) data from one installation of the EAB to another, such that whenever an addition, change, or deletion is made to the EAB on a given system, it is available to all EAB installations within the network.
The replication of Domino directories between on-premises Domino servers and SmartCloud Notes cloud servers. This process also applies to synchronizing LDAP with the Connections Profiles database.
directory user agent (DUA)
In OSI, an application process residing in an open system that serves as the agent that obtains directory services for that open system. The agent can obtain the services either locally or from a remote directory system agent.
direct outward calling (DOD)
A service of a local phone company (or local exchange carrier) that allows subscribers within a company's private branch exchange (PBX) system to connect to outside lines directly.
Direct Printer Services Subsystem (DPSS)
The PSF subcomponent that acts as the interface between PSF and an application program when the job entry subsystem is not spooling jobs for a printer. DPSS attaches PSF as a subtask for use in the direct-printing mode.
direct printing mode
A printing mode that gives PSF exclusive use of a channel-attached printer. Output is printed immediately and is not spooled through JES. See also deferred printing mode.
- In Internet communications, the transmission of an Internet Protocol (IP) datagram when the destination and the source reside on the same IP network or IP subnet.
- An option for routing publications in a publish/subscribe cluster. With direct routing, every queue manager in the cluster sends publications from any publishing queue manager direct to any other queue manager in the cluster with a matching subscription.
direct sales business model
A business model that supports commerce transactions involving products, services, or information directly between businesses and consumers or between two businesses or parties. See also B2B direct business model, consumer direct.
direct sales store
A customer-facing store that supports the exchange of products, services, or information directly between businesses and consumers, or between two businesses or parties. See also extended site store.
direct search list (DSRLST)
A message unit that contains a search request that is sent throughout subarea networks to obtain information about a network resource (such as its name, routing information, and status information).
direct speech recognition
Identification of words from spoken input read directly from the telephony channel. See also indirect speech recognition.
An amount of money used to acquire products and services that contribute directly to the manufacture of a product. In a manufacturing environment, direct spend includes purchasing raw materials or subcontracting a manufacturing service.
One of the DirectTalk Beans that provides access from a voice application to simple call control functions: waiting for a call, making an outgoing call, handing a call over to another application, and returning a call when finished.
See Message Center.
A tendering event in which the shipper overrides the Route Guide and selects a specific carrier to take the shipment. Shippers can perform a direct tender by submitting a shipment through data exchange with the carrier already assigned. See also manual tender.
See DADSM interrupt recording facility.
Pertaining to a screen of multiple widgets that contain unsaved data. See also dirty check.
dirty address space
An address space requiring daemon authority that has had an uncontrolled program loaded into it. A dirty address space cannot perform daemon activities. See also controlled program.
The process of determining whether there is unsaved data on a screen. See also dirty.
- An SQL transaction that reads data that is written by concurrent uncommitted transactions.
- A read request that does not involve any locking mechanism. This means that data can be read that might later be rolled back resulting in an inconsistency between what was read and what is in the database. See also read integrity, read uncommitted.
- Pertaining to a state of a processing unit that prevents the occurrence of certain types of interruptions. See also enabled.
- In VTAM, pertaining to a logical unit (LU) that has indicated to its system services control point (SSCP) that it is temporarily not ready to establish LU-LU sessions. An initiate request for a session with a disabled logical unit (LU) can specify that the session be queued by the SSCP until the LU becomes enabled. The LU can separately indicate whether this applies to its ability to act as a primary logical unit (PLU) or a secondary logical unit (SLU). See also enabled, inhibited.
- Pertaining to the state in which a transmission control unit or audio response unit cannot accept incoming calls on a line.
- Pertaining to an object that is not accepting new data. Disabling an object does not affect the definition or existence of that object, rather, disabling an object keeps new data from flowing into the object and to all objects that rely on the target object.
The object mode in which a database object is disabled. When a constraint, index, or trigger is in the disabled mode, the database server acts as if the object does not exist and does not take it into consideration during the execution of data manipulation statements.
A rule that prevents a transaction from proceeding when the rule's conditions are met. Approval by a member of an approval group cannot override violations of a disallow rule, and no additional rules are evaluated.
- A procedure for copying and storing an installation's essential data in a secure location, and for recovering that data in the event of a catastrophic problem. See also vital records.
- The process of restoring a database after a partial or complete site failure that was caused by a catastrophic event such as an earthquake or fire. Typically, disaster recovery requires a full database backup at another location.
- The process of restoring a database, system, policies after a partial or complete site failure that was caused by a catastrophic event such as an earthquake or fire. Typically, disaster recovery requires a full backup at another location.
- A file that is created by the disaster recover manager (DRM) that contains information about how to recover computer systems if a disaster occurs and scripts that can be run to perform some recovery tasks. The file includes information about the software and hardware that is used by the server, and the location of recovery media.
- A set of detailed procedures that are required to activate the disaster recovery center in the event of a disaster which impacts the production environment site. The disaster recovery plan is reviewed and tested annually.
- In System Manager, a grouping of systems management tasks that support an enterprise's information system environment. Examples of disciplines are change management and problem management.
- An ordering method used to line up jobs for printing.
Disciplined Agile Delivery (DAD)
A hybrid approach to software design that extends scrum project management techniques with proven strategies from agile modeling, extreme programming (XP), and the Unified Process (UP), as well as the Kanban, lean, and outside-in software development methods, among others. It is not proprietary, so it is freely available for all to use.
disclosure review board
See invention development team.
- In communications, the transmission control character that is part of the sequence for disconnecting a switched line.
- To break the connection between an application and a queue manager.
discontiguous shared segment (DCSS)
An area of virtual storage outside the address range of a virtual machine. It can contain read-only data or reentrant code. It connects discontiguous segments to a virtual machine's address space so programs can be fetched.
- To identify resources within a network environment.
- In UDDI, to browse the business registry to locate existing web services for integration.
Discoverable Taxonomy Set (DTS)
A collection of taxonomy schemas and linkbases. The DTS includes all taxonomy schemas and linkbases that can be discovered by following links or references in the taxonomy schemas and linkbases included in the DTS.
A server that runs the middleware agent and is found outside of the administrative environment but has a server representation automatically created within the administrative environment. The representation that is created is an assisted life-cycle server.
- The automatic detection of a network topology change, for example, new and deleted nodes or links.
- In law, the pretrial phase in a lawsuit in which each party can request documents and other evidence from other parties or compel the production of documents and other evidence using the legal system.
- The process of finding resources within an enterprise, including finding the new location of monitored resources that were moved. See also data collection, schedule.
- The process during which each party in a lawsuit requests relevant information and documents from the other side. Any information that is relevant to the case must be preserved to ensure compliance with legal responsibilities.
- The process of identifying the configuration items present in an IT environment.
The relationship created with the method or application used to discover a device. An existing device in the data center model must have a discovery association in order to perform discovery.
An employee who is responsible for preserving or collecting legally pertinent information that resides on a specific data source. A single data source can have more than one discovery delegate or none unless the system is configured such that a discovery delegate is a required part of a data source's definition.
discovery export action
An action that identifies duplicate files based on content-based digest and exports only one copy of a file per data server. The discovery export action copies data objects and generates an EDRM XML file for loading into third-party legal review tools.
discovery export volume
A storage entity that contains data that is produced from a discovery export action or from a policy. The data is kept so that it can be exported as a load file and uploaded into a legal review tool.
- A program that copies data from a management software system, converts it to IDML, and stores it in books in the discovery library.
- A component of an IBM product that captures discovery information.
- The actions that an administrator or Tivoli Intelligent Orchestrator is to take if a certain new item or if a difference in the data model is discovered.
- A policy that defines an area of the web environment to investigate and sample the transaction activity of real customers and average performance times for Uniform Resource Indicator (URI) requests during a specified time period to set a baseline of performance.
Pertaining to an element that is cleanly separated from another element; they are not connected. For example, integers are discrete: between any two consecutive integers, there is some distance.
In architecture, a bar code symbology characterized by placing spaces that are not a part of the code between characters, that is, intercharacter gaps. See also continuous code.
A Resource Access Control Facility (RACF) profile that contains security information about a single data set, user, or resource. See also data set profile, fully qualified generic profile, generic profile, profile, resource profile.
discrete word recognition
Identification of spoken words separated by periods of silence, or input one at a time. See also continuous speech recognition.
discretionary access control
A security mechanism that protects information from unauthorized disclosure or modification through owner-controlled access to files. See also mandatory access control.
See soft hyphen.
In Ada language, a distinguished component of an object or value of a record type. The subtypes of other components, or even their presence or absence, may depend on the value of the discriminant.
In XDR, a C language union that holds several data types, with one arm of the union being an enumeration value, or discriminant, which holds a specific object to be processed over the system first.
An object that enables a system to select operations and event reports related to other managed objects. See also event forwarding discriminator.
- Pertaining to a security label relationship where two security labels must not be equivalent and neither one can dominate the other. See also dominant, equivalent.
- See node disjoint.
- A storage device that includes one or more flat, circular plates with magnetic or optical surfaces on which information is stored.
- See drive.
The hardware used by a computer to access and control disk drives. On POWERstations and POWERservers, disk adapters each fit into a single Micro Channel slot, and each are controlled by software device drivers.
disk array controller
The device, such as a Redundant Array of Independent Disks (RAID), that manages one or more disk arrays and provides functions. See also disk array router.
disk array router
A router that represents an entire array, including current and deferred paths to all logical unit numbers (LUNs). See also disk array controller.
A definition of the type of data that the disk contains and the failure group to which this disk belongs. See also failure group.
- See drive.
- The mechanism used to read and write information on a disk.
disk drive bay
- A field-replaceable unit (FRU) that consists of a single disk drive and its associated packaging.
- See drive.
disk drive module group
See disk 16 pack.
- The part of a disk unit that contains the read and write heads, the magnetic disks, and the actuators.
- A sealed container that holds the read/write head and disk assembly within a disk unit.
The failure of a disk or disk adapter. Disk events are handled by the AIX operating system through LVM mirroring on SCSI disk devices and by internal data redundancy on RAID device disk arrays.
See stateful node.
A collection of disk drives in the same loop configured by the ESS to be available for assignment as a Redundant Array of Independent Disks (RAID). A disk group can be formatted as count key data (CKD) or fixed block, formatted as RAID, or left unformatted. A disk group is a logical assemblage of multiple disk drives, in contrast to a disk eight pack or disk 16 pack.
Fixed-disk input and output. See also buffered disk I/O.
A method for controlling access to storage devices from multiple host systems. Any host that wants to access a storage device configured to use disk leasing registers for a lease; in the event of a perceived failure, a host system can deny access, preventing I/O operations with the storage device until the preempted system has reregistered.
The property of a workstation that has no local file systems or local boot images to access some of its resources remotely. Diskless clients boot remotely from a diskless server and use the server for remote paging.
- See stateless node.
- A Linux node with no disk or a Linux node that does not use its disk to store the operating system or packages.
Disk on Module (DOM)
A USB flash drive that can be used in place of a hard disk drive. Disk on Modules (DOMs) are used particularly in embedded systems where they can be deployed in an environment that mechanical hard disk drives fail to operate. DOMs can also be deployed in thin clients because of their relatively small size, low power consumption (and low heat output), and silent operation.
- In z/VM Center, a logical grouping of contiguous disk spaces. A disk pool can include disk spaces from multiple physical disks. A disk pool corresponds to a z/VM Directory Maintenance Facility allocation group.
- An auxiliary storage pool that contains only disk units.
An event in which a surviving node assumes control of a shared disk so that the disk remains available when the node that currently owns the disk fails (for nonconcurrent access configurations). See also fast disk takeover.
A sealed container that holds the read and write heads, the magnetic disks, and the actuators. See also random access memory.
The relationship of ones and zeros in an encoded character. Neutral disparity indicates an equal number of ones and zeros, positive disparity indicates a majority of ones, and negative disparity indicates a majority of zeros.
- To assign an officer to respond to a particular alarm or incoming call.
- To allocate processing time on a specific device for a job that is ready to run.
- In CICS, to schedule a task for execution. Dispatching is done by CICS task control. See also service request block.
- A stand-alone application that acts as an intermediary between one or more devices and large event providers. The dispatcher retrieves all location messages from the event providers it is connected to and distributes them to one or more devices.
- In XOM, the software that implements the service interface functions using workspace interface functions.
Major component of CICS concerned with attaching, running, and detaching tasks and scheduling task control blocks for the various modes: quasi reentrant, resource-owning, or concurrent.
- A positive or negative number that can be added to the contents of a base register to calculate an effective address.
- The distance from the beginning of a record, block, or segment to the beginning of a particular field.
- To direct the output to the user's terminal. If the output is not directed to the terminal, the results are undefined.
- A visual presentation of data.
- A search application component that defines the appearance of the web pages for the search application.
- To present data visually.
- In XGSL, any one of the following characteristics associated with displays: (a) blink supported or not supported, (b) color or monochrome, (c) changeable color palette or fixed color palette, and (d) APA (all points addressable) or character. An APA display can address each pixel, while a character display addresses character-sized blocks of pixels.
- In computer graphics, a property that is assigned to a display element, to a display segment, or to the complete display image; for example, a bright intensity or particular color.
A set of display preferences that a customer at a multicultural store can select, depending on their language and locale. For example, a multicultural commerce site may have different formats for United States English and Japanese. These display formats would differ in the language of the text as well as such features as currency, units of measure, and data formats.
- In 3270 emulation, the x-character block (where x is the maximum number of characters that can fit on the display screen, or 1920 for printers) that contains data in the sequence in which it would appear on the display screen or the printer. When creating the display, the user can specify the display image with or without field definitions, such as position, length, and other attributes.
- A collection of display elements or segments that are represented together at any one time on a display surface.(I)(A)
See display type.
In GL, a sequence of drawing commands that have been compiled into a unit and perform like a macro; an object can be invoked multiple times simply by referring to its name. The object can be instantiated at different locations, sizes, and orientations by appropriate use of the transformation matrices.
- A page in a catalog that displays category and product information.
- A page in an online store that is generated in response to a command.
A device, usually equipped with a keyboard and a display device, capable of sending and receiving information over a communications line. See also workstation.
display station pass-through (DSPT)
A communications function that allows a user to sign on to one system (such as a System i, a System/38, or a System 36 system) from another system (such as a System i, a System/38, or a System 36 system) and use that system's programs and data.
In Tivoli NetView for OS/390, one of the three elements, which also include data type and resource type, that are used to describe the organization of panels. Display types include total, most recent, user action, and detail.
- The process of decommissioning applications at the end of their business utility and after legal duties have elapsed.
- The process of removing or deleting data or from the system typically after a defined period.
- The status of an alert.
- To assign a status to an alert.
- The session to which a data management event is delivered. An individual disposition is set for each type of event from each file system.
- In printing, the process of specifying whether a print job should be printed, retained, or printed and then retained.
- A status given to a candidate within an applicant tracking system (ATS) to signify their current level of completion within the hiring process.
- The action that is taken when a record reaches the end of its retention period. Common disposition types are destroy or delete, transfer to an archive, or review by the record owner.
- The state of a record after cutoff is applied through created disposition schedules and associated with containers.
- In file processing, the process of specifying whether a file is new, old, or shared, and how the file is to be shared.
- In WebSphere Commerce, disposing of or transferring inventory that has been returned to the Seller's fulfillment center by a customer. See also fulfillment center.
An action that is performed on entities after the cutoff is reached or when their retention period in a disposal phase is over. For vital records, the disposition action is a periodic review.
A function performed on data sets at the end of a job step to keep, delete, catalog, remove from a catalog, or pass them to a subsequent job step, depending on the data set status of the disposition specified in the data definition (DD) statement.
The set of instructions for disposing of a record. A disposition schedule specifies the retention rules for records and instructions for disposing them when the retention period ends. An authorized user defines a disposition schedule and associates the schedule with a record category, record folder, or record type. A volume inherits the disposition schedule of the record folder under which it is created.
The process of resolving conflicts between two or more parties. Tealeaf facilitates dispute resolution by serving as a neutral transaction record. For example, if a customer thought they were buying a product at one price yet discovers a charge for another price, Tealeaf's session replay can be used to show the price displayed to the customer at the time of the transaction.
distance-vector routing protocol
A type of routing protocol in which each router uses the number of hops in a route to find the shortest-path spanning tree and periodically sends its entire routing table to its neighbors. See also link state routing protocol.
distinct data type
In SQL, a data type derived from another data type. A distinct type always has the same internal storage representation as its source type (such as an existing opaque data type, built-in data type, named row type, or distinct data type). It might have the same casts and routines as its source type, however it must have a unique name. See also data type.
A user-defined data type that shares a common representation with a built-in data type. See also built-in data type, strongly typed distinct type, user-defined data type, weakly typed distinct type.
Distinguished Encoding Rules (DER)
A standard, based on the Basic Encoding Rules, that is designed to ensure a unique encoding of each ASN.1 value, defined in ITU-T X.690. See also Basic Encoding Rules.
- In Open System Interface (OSI), a multipart hierarchical name that can be used to identify OSI objects globally. The distinguished name of an object is formed from the sequence of its relative distinguished names (RDNs) and the name of its superior object.
- The name that uniquely identifies an entry in a directory. A distinguished name is made up of attribute:value pairs, separated by commas. For example, CN=person name and C=country or region. See also bind distinguished name.
- A set of name-value pairs (such as CN=person name and C=country or region) that uniquely identifies an entity in a digital certificate.
In data communications, an undesirable change in a wave form that can occur between two points in a transmission system. The six major forms of distortion are: (a) bias, (b) characteristic, (c) delay, (d) end, (e) fortuitous, and (f) harmonic.
- Pertains to non-mainframe hardware platforms, including personal computers and workstations. See also distributed software, distributed software.
- Pertaining to programs and computerized sources of information of a computing environment that are physically located on different computer systems, while still working together as a single logical unit.
The software running on a computer that is part of a Tivoli Workload Scheduler domain, on which you can schedule jobs from Tivoli Workload Scheduler for z/OS. Examples of distributed agents are the following: standard agents, extended agents, fault-tolerant agents, and domain managers. See also fault-tolerant workstation.
- In message queuing, a set of application programs that can each be connected to a different queue manager, but that collectively comprise a single application.
- An application made up of distinct components that are located on different computer systems, connected by a network. See also client/server.
- A streams processing application that runs on the runtime system. See also stand-alone application.
A method of computing in which large problems are divided into small tasks that are distributed across a network for simultaneous processing. Individual results are then brought together to form the total solution.
Distributed Computing Environment (DCE)
In network computing, a set of services and tools that supports the creation, use, and maintenance of distributed applications across heterogeneous operating systems and networks.
A database that appears to users as a logical whole, locally accessible database, but consists of databases in multiple locations that are connected by a data communications network. See also distributed file management.
Distributed Database Management System (DDBMS)
A database physically stored in two or more computer systems. Although geographically dispersed, a distributed database system manages and controls the entire database as a single collection of data.
distributed data interface (DDI)
An optical fiber-based LAN using the ANSI X3T9.5 standard for a token-passing ring MAC protocol and its physical attachments. Stations, concentrators, and bridges in a DDI network are physically connected to one or both of a pair of counter-rotating rings operating at 100Mbps. The term DDI is used to represent all LAN types based on the fiber distributed data interface (FDDI) specifications, regardless of the media used (optical fiber, copper, or shielded twisted pair).
distributed data management (DDM)
A function of the operating system that allows an application program or user on one system to use database files stored on remote systems. The systems must be connected by a communications network, and the remote systems must also be using DDM.
Distributed Data Management Architecture (DDM Architecture)
A connection protocol that enables communication between a system that uses distributed file management and a system that uses distributed relational database architecture.
distributed data management attribute
An attribute that is used in addition to those required for local z/OS data access. Some examples of associated DDM attributes are file size, hidden file, and lock options.
distributed directory database
The complete listing of all the resources in the network as maintained in the individual directories scattered throughout an APPN network. Each node has a piece of the complete directory, but it is not necessary for any one node to have the entire list. Entries are created, modified, and deleted through system definition, operator action, automatic registration, and ongoing network search procedures.
- A file that can be accessed by remote applications or remote users.
- A file that physically resides on more than one computer in a network.
distributed file management
A function of the operating system that allows an application program or user on one system to use database files stored on remote systems. The systems must be connected by a communications network, and the remote systems must also be using distributed file management. See also distributed database.
An implementation of target (server) support as defined by distributed data management (DDM). DDM permits systems in an extended enterprise that have DDM source (client) capability to access file data on a target MVS system. See also extended enterprise, source, target.
- A component of a Distributed Computing Environment (DCE) that enables a single, integrated file system to be shared among all DCE users and host computers in a DCE cell. DFS prevents DCE users from simultaneously modifying the same information.
- A base element of z/OS that allows users to access and share data in a distributed environment across a wide range of IBM and non-IBM platforms.
- A service that provides data access over IP networks.
distributed function mode
See distributed function terminal.
- A workstation that performs operations previously accomplished by the processing unit, such as managing data links, controlling devices, and formatting data.
- A protocol used for communication between a terminal and an IBM control unit that supports multiple, concurrent, logical, terminal sessions.
distributed host command facility (DHCF)
A function of the operating system that supports the data link between a System/370 terminal using a System i application in an HCF (Host Command Facility) environment.
distributed identity filter
A mapping association between a RACF user ID and one or more distributed user identities which is stored in a general resource profile. A distributed identity filter consists of one or more components of a distributed user's name and the name of the registry where the user is defined.
distributed network directory
See distributed directory database.
distributed presentation management (DPM)
An MFS option that allows programs to communicate with device independence by sharing message formatting functions between MFS and a user-written remote program. The user-written remote program performs device-dependent formatting.
See remote printing.
distributed print system
A computer system that interchanges print data across different computing environments, allowing data to be printed on a system other than the one that the print request was generated. For example, in host-to-LAN distributed printing, data that resides on the host is printed on printers attached to a local area network (LAN).
Distributed Protocol Interface (DPI)
An extension to the Simple Network Management Protocol (SNMP) agent that permits users to dynamically add, delete, or replace management variables in the local Management Information Base (MIB) without requiring recompilation of the SNMP agent.
Distributed Protocol Interface API (DPI API)
In the Simple Network Management Protocol (SNMP), a program interface for a subagent that provides an extension to the function provided by the SNMP agent.
A query that accesses data from a database other than the current database. See also coordinating server.
An alternative RAID scheme where the number of drives that are used to store the array can be greater than the equivalent, typical RAID scheme. The same data stripes are distributed across a greater number of drives, which increases the opportunity for parallel I/O and hence improves overall array performance. See also rebuild area.
Distributed Relational Database Architecture (DRDA)
The architecture that defines formats and protocols for providing transparent access to remote data. DRDA defines two types of functions: the application requester function and the application server function.
distributed routing model
A "peer-to-peer" dynamic routing system, in which each of the participating CICS regions can be both a routing region and a target region. The distributed routing model is implemented by the distributed routing program.
distributed software (DSW)
Software that runs on personal computers, workstations, or servers, rather than on mainframes. See also distributed.
Distributed System License Option (DSLO)
An option available to IBM customers with a basic license that permits them to copy certain IBM-licensed materials for the purpose of installing multiple systems.
distributed systems node executive (DSNX)
A function of the operating system that receives and analyzes requests from the NetView Distribution Manager licensed program on a host system. If the request is directed to the system that receives it, the request is processed on that system or on a personal computer directly attached to that system. If the request is intended for a different system, it is routed toward its destination.
- A transaction that affects data on multiple nodes. The nodes can be on one system or across multiple systems.
- A transaction that updates data in more than one database, user process, or machine. See also two-phase commit, XA.
- In a distributed process, all processing between two sync points taken by two or more intercommunicating transactions using a two-phase commit protocol. A DUW is a distributed LUW.
- A unit of work that allows SQL statements to be submitted to multiple relational database management systems, but no more than one system per SQL statement.
Distributed Voice Technologies (DVT)
A component of DirectTalk that provides an interface to allow you to integrate your own voice technology (such as a speech recognizer) with your DirectTalk system.
The designated contact (point of entry) for a sysplex. The distributing host is the normal owner of the IP address that clients in the network use to connect to the sysplex. See also backup host.
- The target for a notification of events that are generated by the system. For example, a distribution can be email addresses, FTP sites, or other customized locations.
- A software package that is ready to install. A distribution often refers to a Linux package that contains the Linux operating system, an installation program, utilities, and documentation.
- A set of reports contained in a bundle and have the same recipient list.
An arrangement of entries that indicates the number of records that are hashed into a hash index. See also distribution file.
A file that stores a distribution array. See also distribution array.
A unique identifier for each distribution. A distribution ID has two components: the distribution name, a 1- to 8- character alphanumeric string and the distribution description, a one to 55-character string.
An ordered set of one or more columns in a table. The values in the distribution key columns are used to determine the database partition to which each table row belongs. See also database partition, table-partitioning key.
- A list of queues to which a message can be put with a single statement.
- A global list of mailbox server mailboxes. A distribution list can be used by all mailbox users. Instead of addressing messages to each individual, the individual mailboxes can be grouped into a distribution list.
- In voice mail, a list of subscribers to whom the same message can be sent.
- A list of system distribution directory entries, which allows users to send messages, notes, and documents to a group of users in one step.
A map that specifies an array of database partition numbers that is used to distribute data among the database partitions of a database partition group. The array of database partition numbers distributes the data by using a hashing algorithm.
- The medium on which the operating system software, a licensed program, or an application program is distributed to the user. The distribution medium can be any of several different media supported by the hardware, such as streaming cartridge tape, 9-track tape, or 3.5-inch diskette.
- The media that a central site creates and distributes to target systems. See also installation media.
A load-balancing policy that can be specified for a resource group and that the application uses to place resource groups on a node when a node joins a cluster. See also resource group, resource group policies, startup.
A network-wide attribute that controls the placement of the service IP label aliases on the physical network interface cards on the nodes in the cluster. Configuring a distribution preference customizes the load balancing for service IP labels in the cluster, taking into account the persistent IP labels previously assigned on the nodes. See also anti-collocation, collocation, collocation.
A set of ODF programs that perform the task of initiating print processing based on the criteria of the distribution method and the settings of the wait/ignore indicator for bundle components.
distribution recipient index
See distribution recipient queue.
distribution recipient queue
An internal object that contains entries for incoming object distributions; incoming document distributions, such as files, notes, or messages; outgoing document distributions; and error distributions.
In Managed System Services, a staging area for objects that are to be sent or have been received. Objects are loaded into the repository to be sent to managed systems at a later time.
distribution requisite fix
A temporary solution to or a bypass of a problem that is necessary to provide a complete solution to correct a problem. The system allows you to apply the distribution requisite fix either before the PTF that needs it, with the PTF that needs it, or after the PTF that needs it. See also corequisite fix, prerequisite fix.
A business rule established for the shipping or receiving node determination process. Distribution rules are used to associate inventory items with a specific shipping or receiving node.
distribution service level
In SNADS, the combination of priority, capacity, and protection requirements that must be satisfied to receive or send a distribution. SNADS has service levels of fast, status, data high, and data low. Items with a service level of fast, status, or data high are put on the priority queue. Items with a service level of data low are put on the normal queue.
See Darwin Information Typing Architecture.
diverted theme line
A theme line that is attached to an event frame such that when the event frame is moved, the theme line maintains its vertical position with respect to the frame. See also event frame, theme line.
See Digital Intel Xerox protocol.
See dependent job control.
See dependent job control network.
See dump job facility.
See discovery library adapter.
See data link connection identifier.
See data link control layer.
See data link escape character.
See Data Language/I.
DL/I address space
An address space that is used by the online IMS control program to contain most of the DL/I code and control blocks. This option can be selected for the online IMS environment to provide an alternative virtual storage configuration.
See distribution library.
DL/I interface block (DIB)
A block containing variables automatically defined in an application program using HLPI to receive information passed to the program by DL/I during execution. A block automatically inserted into a program by the DLI command translator. Whenever a program issues an EXEC DLI request, DLI responds by storing information in the DIB.
- In Analyst, a link that copies information in and out of cubes, and sometimes to and from text or ASCII files.
- The optical connections between supernodes for forming an HPC cluster.
See DLI separate address space.
DLI separate address space (DLISAS)
A component of DBCTL that resides in the IMS address space. It is a separate address space that contains DL/I code, control blocks, buffers for DL/I databases and program isolation.
A format that allows the user to enter text from another D-list in a row or a column. The format may be used in database-type functions to consolidate data in a similar manner to query-style reports.
See dynamic link library.
See document library object.
See data loss prevention.
See dynamic LPAR.
See dead-letter queue.
See Data Link Service access point.
See data link switching.
See distributed ledger technology.
See dependent LU server.
See direct memory access.
A device on the Micro Channel bus that uses the system-provided DMA facilities instead of having a built-in controller. See also bus master.
See DMB element.
See Desktop Management Interface.
See Device-Mapper Multipathing.
See Data Management Object Model.
See dimensional modeled relational data.
See dynamic message sign.
- The custom ISDN protocol implemented on the DMS100 switch, providing 23 B-channels and a D-channel over a T1 trunk.
- A Northern Telecom switch.
DMS table space
See database-managed space table space.
See Distributed Management Task Force.
See demilitarized zone.
See distinguished name.
See Digital Network Architecture.
See data network identification code.
See dialed number identification service.
See DNS Blackhole list.
See Domain Name System server.
See derived object.
See document ID.
An overhead door with access to the exterior of the building and equipment for loading/unloading trucks, trailers, and containers. A dock door can be designated receiving, shipping, or both.
- A program written with the doclet API that specifies the content and format of the output to be generated by the Javadoc tool.
- An annotation tag that is inserted in the Java source as a Javadoc style comment and generates extensible application artifacts that are ready to be deployed. See also annotation tag.
See drawing order coordinate space.
See document store.
- An attachment of any medium such as a text file, a spreadsheet, graphics, videos, or a URL that can be appended to an element in the work breakdown structure (WBS), a resource record, scope element or requirement.
- A Notes database entry that users create by using a form on the Create menu. Documents consist of fields, text, numbers, graphics, and so on. Information may be entered by a user, automatically calculated by formulas, imported from other applications, or linked to another application and dynamically updated.
- Any collection of data stored in a document object. A document can contain any type of data. See also document library object.
- A machine-readable collection of one or more objects that represent a composition, a work, or a collection of data.
- A logical structure that a CICS transaction can use to manipulate text or other structured information. See also document template.
- An object saved in an object store or library. Documents have properties and security, and may additionally have content, versions, lifecycles, and subscriptions.
- An entity that carries information through a configured workflow process, such as an order, a quote, or a return.
- In ANSI, a business document, such as a purchase order or invoice, that can be represented in any supported format. For example, an XML purchase order and an EDI purchase order are both documents, but each uses a different format. See also message.
- An archived file and its accompanying metadata.
- An item that can be stored, retrieved, and exchanged among Content Manager systems and users as a separate unit. It can be any multimedia digital object. A single document can include varied types of content, including for example, text, images, and embedded artifacts. See also work basket, workflow.
- In DCF, a person who is responsible for defining markup conventions and procedures for an organization.
- The person who defines, organizes, manages, controls, and protects documents. (T)(A)
- A user-defined character string, 1 through 16 characters long, that characterizes a document. It can be used to search for a filed document. For example, a document that is a memo could have a document class of MEMO; a document that is a report, REPORT.
- A category for documents in an object store or library. Every document belongs to a document class, such as Purchase Orders. The document class determines the properties, storage location, security, lifecycle, and versioning of the document. See also desktop form template document class, form data document class, form policy specification document class, form proxy custom object class, form template, form template document class, root class.
See data collection.
In architecture, an architected part of a document data stream. Examples of document components are documents, pages, page groups, indexes, resource groups, objects, and process elements.
Document Content Architecture (DCA)
An architecture that guarantees information integrity for a document being interchanged in an office system network. DCA provides the rule for specifying form and meaning of a document. It defines revisable form text (changeable) and final form text (unchangeable).
document conversion processor
A computer program that processes a machine-readable document that includes formatting controls written in one formatter language, to produce a machine-readable document that includes formatting controls appropriate for another formatter language.
- See structured field.
- The outermost element of an XML document or fragment.
document environment group
In PSF, an internal object (a required part of every form definition) that identifies suppression usage, identifies overlays to be used, and defines the placement of one or more pages on the form.
- The degree to which a document presentation preserves the creator's intent.
- The ability to faithfully replicate a document.
Document Interchange Architecture (DIA)
The rules and structure for the exchange of information between office applications. Document Interchange Architecture includes document library services and document distribution services.
A set of all the form layouts for the application in the sequence in which they are used. Document layout determines the set of global resources for the document, including fonts and page segments, and determines the fields that make up the application data records.
- The entire collection of documents and folders on a system.
- A set of VSAM data sets, accessible in a batch environment, that contain documents and related files.
document library object (DLO)
Any system object that resides in the document library, such as RFT and FFT documents, folders, and PC files. See also document.
document library services
The services defined by the Document Interchange Architecture (DIA) to work with objects filed in the DIA document library. On the system, it is the support that lets users work with the contents of the document library.
The 1- through 12-character name for documents in folders, assigned by the user when creating the document. See also document object name.
The number assigned to a printed document when a user files that document. The first two digits of the document number are the year, and the last five are in sequence, with the most recent documents having the highest number. For example, the fifth printed document filed in 1989 would have the number 89-00005.
Document Object Model (DOM)
A system in which a structured document, for example, an XML file, is viewed as a tree of objects that can be programmatically accessed and updated. See also Simple API for XML.
document object name
The 10-character name of a document assigned by the system when a user files the document. See also document name.
A reference document or template used to create new documents. See also document type.
A specification that indicates which form template and form data entry template are used for the policy, how mapping is configured between form template fields and document class properties, and any special property settings or security features. See also form policy, form policy specification document class, form template, form template document class.
Document Printing Application (DPA)
An OSI standard (ISO/IEC 10175) that addresses those aspects of document processing that enable users in a distributed open systems environment to send electronic documents to shared, possibly geographically-dispersed, printers.
A company's program or practice of retaining documents and information to comply with various state, federal, and international statutes and laws. The practice is used to serve their business interests by retaining information important to the corporation.
document root directory
The primary directory in which a web server stores accessible documents. When the server receives requests that do not point to a specific directory, it tries to serve the requests from this directory.
document routing process
In Content Manager a sequence of work steps, and the rules governing those steps, through which a document or folder travels while it is being processed. See also work step.
A unit of information that is used to construct a document. A document template can contain fixed text, and symbols that represent text whose value is supplied by an application program. See also document.
- A template for a specific type of requirements document. The document type uses the document outline and specifies the filename extension. See also document outline.
- The type of data in a particular Printing Systems Manager (PSM) document. For example, a print file document contains only printable data, and a print resource document contains only data such as fonts or form definitions that are not printable.
- A classification that helps to organize and classify documents that belong to a specific case. Properties can be assigned to a document type to provide additional information about the documents. An example of a document type is a job application form.
- A document that is defined by a specific XML template that has been designed to support a specific transaction set or business process. The document type defines possible processes and system behaviors that occur as the document goes through its life cycle.
- The definition of a non-Document Interchange Architecture (DIA) document user type that identifies the document type number, name, and text associated with the document.
- The rules that specify the structure for a particular class of SGML or XML documents. The DTD defines the structure with elements, attributes, and notations, and it establishes constraints for how each element, attribute, and notation can be used within the particular class of documents.
document type set
A value that allows a logical grouping of document type definitions. Document type sets include the name and the description. A set can contain one or more document types or it can be empty.
See direct outward calling.
See device output format.
A social bookmarking service that allows users to centrally store, categorize, and share a set of personal bookmarks. Users can assign multiple tags to organize their bookmarks. See also folksonomy, social bookmarking, tag.
- A set of commands in a control language program defined by a DO command and an ENDDO command that is conditionally processed as a group.
- In RPG, a group of calculations done one or more times based on the results of comparing factor 1 and factor 2 of certain calculation operations (for example, DOUxx). A DO operation and an END operation are the delimiters for a do group.
See Domain of Interpretation.
- A partition of the management space of an appliance.
- A functionally isolated area of the CICS system that owns resources to which it has sole access and that communicates with other parts of CICS through strictly defined interfaces called gates.
- A collection of entities related to a specific purpose or function.
- An individual division of a major operation, which generally matches the organization structure and the expertise of the people involved. For example, a city authority is divided into departments dealing with transportation, water, and public safety.
- A set of systems that allocate shared network resources within a single logical system.
- In a database, the set of valid values for an attribute.
- A logical grouping of resources in a network for the purpose of common management and administration. See also federation domain.
- A part of a network that is administered as a unit with a common protocol.
- The set of potential values that a variable can assume.
- An object, icon, or container that contains other objects representing the resources of a domain. The domain object can be used to manage those resources.
- In TCP/IP, a named set of hosts. Each domain has authority for the machines within that domain, but not for machines in other domains.
- A characteristic of an object that controls which programs can access the object. See also system domain object, user domain object.
- Part of a naming hierarchy that specifies the route. For example, example.com. In Bluemix, domains are associated with orgs. Domain objects are not directly bound to apps. See also custom domain, host, organization, route, subdomain, Uniform Resource Locator.
- In the Internet, a part of a naming hierarchy in which the domain name consists of a sequence of names (labels) separated by periods (dots).
- A named group of workstations in a distributed Tivoli Workload Scheduler network, consisting of one or more agents and a domain manager acting as the management hub. All domains have a parent domain except for the master domain. See also domain manager, full status, master domain manager.
- In communications, the network resources under control of a particular system services control point (SSCP).
- A set of data on which conflict analyses are carried out. It can be identified by a set of applications (or by a set of permissions that are related to applications). A single application can be included in several domains.
- A subnetwork of clients and servers under the control of one security database.
- In information analysis, the set of data in a column.
- A grouping of client nodes with one or more policy sets, which manage data or storage resources for the client nodes. See also policy domain.
- A list of defined values from which users choose an appropriate value.
- A URL to which standard contact replies can be sent, with response handlers. Multiple domains can be set up to provide different response handlers for different types of mailings.
For a Windows NT Server or Windows 2000 Server domain, the server that authenticates domain logons and maintains the security policy and the security accounts master database for a domain. Domain controllers manage user access to a network, which includes logging on, authentication, and access to the directory and shared resources.
In OSI X.400, an attribute of the X.400 originator/recipient name that permits a System i product to keep existing addressing conventions. The System i product uses the domain-defined attributes to carry the user ID and address (the two-part network name used in SNADS).
See services tier.
An installed component in a distributed Tivoli Workload Scheduler network that is the management hub in a domain. All communication to and from the agents in the domain is routed through the domain manager. See also backup domain manager, domain, workstation.
In Internet communications, a name of a host system. A domain name consists of a sequence of subnames that are separated by a delimiter character, for example, www.ibm.com. See also Domain Name System.
- An Internet service that translates domain names into IP addresses.
- A server program that supplies name-to-address conversion by mapping domain names to IP addresses.
Domain of Interpretation (DOI)
A group of related protocols that uses the Internet Security Association and Key Management Protocol (ISAKMP) to negotiate Security Associations (SAs). A DOI defines payload formats, exchange types, and conventions for naming security-relevant information such as security policies and cryptographic algorithms and modes.
In a multiple-domain network, the person or program that controls operation of resources controlled by one system services control point (SSCP). See also network operator.
A group of usually consecutive subject-specific terms that can be mechanically recognized and annotated by the text analyzer without the context of the sentence structure. Domain terms can be built into two types of dictionaries, one being a standard format lexical dictionary, another being multiword format dictionary.
A feature of IBM Tealeaf that enables the client to capture the Document Object Model of a web page. In IBM Tealeaf, replaying the DOM provides "truer" replay experience because it uses the exact DOM that the user saw at the moment of capture, rather than a simulation produced by a rendering engine.
Pertaining to a security label relationship in which the security level and set of security categories of one label is equal to or greater than the security level of the second. See also disjoint, equivalent.
Domino Application Services
Services that enable the Sametime server to function in a Domino environment as part of a Domino domain. The Domino Application Services support IBM Notes access to the Sametime server, the Directory, Replication features, and security for Notes clients. The Web Application Services and Domino Application Services are sometimes collectively referred to as Domino DNA.
A function of the HTTP Server for i5/OS licensed program that enables Lotus Notes users to access the Internet and to use all of the HTTP Server functions. Specifically, a Domino connector enables Lotus Notes users to combine Notes with e-business applications.
A database that provides a domain-wide directory of Domino servers, users, certifiers, foreign domains, and groups. It also contains documents that manage server-to-server communication and server programs.
Domino for i5/OS
See Lotus Domino for i5/OS.
Domino Internet Inter-ORB Protocol (DIIOP)
A server task that runs on the server and works with the Domino Object Request Broker to allow communication between Java applets created with the Notes Java classes and the Domino server. Browser users and Domino servers use IIOP to communicate and to exchange object data.
Domino server program
The program that supports the connection between clients and the server and also manages a set of server tasks, which are programs that either perform schedule-driven database chores -- such as routing messages to mailboxes and updating user accounts -- or connect various types of clients -- Notes clients, web browsers, CORBA clients -- to the server.
A circle graph with a hollow centre that is used for comparing the parts of a whole to the whole. The segments of the hollow circle represent the parts, and the length of each segment represents a proportion of the whole. See also pie chart.
A connection that is suspended and that is not used by SQL statements. See also SQL connection.
In DB2 for i5/OS, the state of a connection when the connection is suspended. While in the dormant state, no SQL statements use the connection except for commits and rollbacks. See also current state.
See denial-of-service attack.
See disk operating system.
A symbol (.) that indicates the current directory in a relative path name. See also period.
- In word processing, a pattern of dots used to form characters.
- In computer graphics, a two-dimensional pattern of dots that are used for designing an image on the display.
dotted decimal notation
The syntactical representation for a 32-bit integer that consists of four 8-bit numbers written in base 10 and separated by dots. IP addresses are represented in dotted decimal notation. See also octet.
See document of understanding.
double buffer mode
In GL, a mode in which two buffers are alternately displayed and updated. A new image can be drawn into the back buffer while the front buffer (containing the previous image) is displayed.
double-byte character large object (DBCLOB)
A data type whose value is a sequence of double-byte characters that can range in size from 0 bytes to 2 gigabytes less 2 bytes. In general, the DBCLOB data type is used whenever a graphic string might exceed the limits of the VARGRAPHIC data type. See also large object.
double-byte character set (DBCS)
A set of characters in which each character is represented by 2 bytes. These character sets are commonly used by national languages, such as Japanese and Chinese, that have more symbols than can be represented by a single byte. See also multibyte character set, single-byte character set.
double-byte coded font (double-byte font)
A font in which the characters are defined by 2 bytes. The first byte defines the coded font section; the second byte defines the code point in the code page specified for that section.
See double-byte coded font.
In printing, an image that is enlarged by doubling the pel pattern horizontally and vertically. See also double-dot technique.
A technique in which the amount of data sent to the printer is reduced one-fourth by decreasing the number of picture elements. See also double-dot image.
A phonetic algorithm that is used for indexing similar or identical names or words with variant spellings based on their English pronunciation. Double Metaphone is the second generation of Metaphone and includes indexing rules that account for spelling peculiarities from other languages. See also Metaphone, Metaphone 3, Soundex.
The specification that causes a floating-point value to be stored (internally) in the long format (two computer words). See also single precision.
double-precision floating-point number
A 64-bit approximate representation of a real number. See also floating-point number.
See two-sided printing.
See high-speed transfer.
To quickly touch a touchscreen display twice. Typically, mobile operating systems use double tap gestures similar to double clicks. See also gesture.
A character, such as a Kanji ideogram, that requires twice the nominal width of other characters, such as the letter A, for the character to be legible on a display screen or a printer.
A storage location whose address is evenly divisible by 8. See also word boundary.
A loop that repeats the same sequence of activities as long as some condition is satisfied. Unlike a while loop, a do-while loop tests its condition at the end of the loop. This means that its sequence of activities always runs at least once.
A fold that points down from the horizontal surface when fanfold forms are unfolded and held horizontally. Fanfold forms are alternately folded with up and down folds. See also up fold.
For Department of Defense (DoD), to lower a record classification from a higher classification to a lower classification. For example, to lower a record classification from Top Secret to Classified. A change in record classification can only be performed using either the upgrade, downgrade or declassify method.
Pertaining to devices that are below a controller, and controllers that are below a communications line in a communications configuration. See also upline.
downloaded fully described font
The IPDS form of a host font downloaded to a printer. PSF converts pairs of host font character sets and code pages into IPDS form before downloading to the printer for printing.
In IPDS architecture, a resource in a printer that is installed and removed under control of a host presentation services program. A downloaded resource is referenced by a host-assigned name that is valid for the duration of the session between the presentation services program and the printer.
- Pertaining to the direction of the flow, which is from the first node in the process (upstream) toward the last node in the process (downstream). See also node.
- Pertaining to a direction that goes with the flow of a development process that moves from requirements to designs to implementation to tests. For example, tests are downstream from requirements. See also upstream.
- Pertaining to the direction of data flow, which is toward the destination of a transmission. See also upstream.
Downstream Load Utility (DSLU)
A licensed program that uses the communication network management (CNM) interface to support the load requirements of certain type 2 physical units, such as the IBM 3644 Automatic Data Unit and the IBM 8775 Display Terminal.
See mean time to recovery.
See Document Printing Application.
See device page.
See destination point code.
See Delivery Project Executive.
See Distributed Print Function.
See Distributed Protocol Interface.
See Distributed Protocol Interface API.
See distributed program link.
See distributed presentation management.
See Display PostScript.
See data-partitioned secondary index.
See Direct Printer Services Subsystem.
A system-defined function and its associated parameters and default values that repair, clean, or standardize incoming data. See also DQM rule.
A rule that defines how data is processed by the data quality management (DQM) processes and DQM functions. DQM rules apply to specific UMF segments. A DQM rule includes the DQM function, the specific parameters, and the order in which the rule is processed. See also data quality management, DQM function, UMF segment.
See database resource adapter.
See disaster recovery as a service.
- To use a pointing device to move an object. For example, a user can drag a window border to make it larger by holding a button pointing device while moving the pointing device.
- In mobile computing, to hold and move an item on a touchscreen display. Typically, apps use drag gestures to move items from one place to another, such as moving an app into a folder of similarly themed apps. See also gesture.
See declustered RAID.
- The act of acquiring a locked resource by quiescing access to that object. See also claim, logical drain.
- To honor pending allocation requests before deactivating sessions with a partner logical unit. This applies to LU 6.2 only.
- An operator action to halt the flow of jobs to a printer, usually to stop the printer or to change print options.
A migration approach in which users migrate artifacts to the new system and let the existing process instances in the old system run to completion. See also milestone-transfer approach.
See dynamic random access memory.
In Enhanced X-Windows, a property of windows and pixmaps when used as destinations in graphics operations. An InputOnly window cannot be used as a source or destination drawable in a graphics operation.
- A section in a palette that contains items that can be selected.
- A unit that contains multiple disk drive modules (DDMs) and provides power, cooling, and related interconnection logic to make the DDMs accessible to attached host systems.
In architecture, a function that can be done during the drawing of a picture for example, displaying a picture, correlation, boundary computation, or erasing a graphics presentation space.
In GOCA, a graphics construct that the controlling environment builds to instruct a drawing processor about what to draw and how to draw it. The order can specify, for example, that a graphics primitive be drawn, a change to drawing attributes or drawing controls be effected, or a segment be called. One or more graphics primitives can be used to draw a picture. Drawing orders can be included in a structured field.
In architecture, a method used to construct a line, called a rule, between two specified presentation positions. The line that is constructed is parallel to either the inline I-axis or the baseline B-axis.
A shipment leg that is automatically created if an LTL shipment is sent into or out of a pool point location. See also pool point.
See Distributed Replicated Block Device.
See dynamic resource definition.
See dynamic reconfiguration data set.
In a multidimensional representation of data, to access information by starting with a general category and moving downwards through the hierarchy of information, for example from Years to Quarters to Months. See also zoom.
- To view the details linked to the data in a report, cube, or macro. For example, the user can drill through a value to view the detailed sales transactions for a particular customer. Any filtering of information in the original object is automatically applied.
- A path used to view details linked to the data in a report, cube, or macro.
- A method of examination used to reveal detail or context information about a cell's contents.
- A data storage device. A drive can be either a magnetic disk drive or a solid-state drive (SSD).
- The mechanism used to seek, read, and write information on a storage medium.
- A circuit that sends small electronic signals to a device.
- The queue pairs at the end of the stream closest to an external interface. The principal functions of the driver are handling any associated device and transforming data and information between the external interface and the stream.
- See device driver.
drive through pallet rack
A pallet rack typically one pallet wide by two pallets deep by four pallets high, designed to allow a forklift truck to drive into the rack to store and retrieve two pallets deep from the same side of the rack.
- The delayed connection of a program to a routine until load time or run time.
- In CDE, to release the mouse button after dragging an object. If the object is dropped in an appropriate area, an action is initiated.
- A partition configured at the time of program execution according to the storage requirements of the application program or program to which the partition is allocated.
A file transfer server that is used for transferring deployable packages from a programming environment to the IBM Commerce on Cloud environments. The IBM UrbanCode Deploy SelfServ tool automatically checks the drop server for new or changed deployable packages and if available imports the packages into the repository for the tool where it can be later deployed into IBM Commerce on Cloud environments.
See distribution resource planning.
- A line printer in which the type are mounted on a rotating drum that contains a full character set for each printing position.(A)
- An impact printer in which a full character set placed on a rotating drum is made available for each printing position. (T)
See directory service.
- See data source adapter.
- See dynamic storage area.
- See Distributed Server Architecture.
- See digital signature algorithm.
- See directory system agent.
See destination subarea field.
See destination service access point.
See data source component.
See default system control area.
See data set control block.
See dummy control section.
See Digital Services Group.
See distributed shell.
See digital subscriber line.
See Distributed System License Option.
See Downstream Load Utility.
See Device Support Module.
See data security monitor.
See default subsystem name.
See data set name.
See data set name block.
See data set name block.
See distributed systems node executive.
See data set organization.
See display station pass-through.
See downstream physical unit.
See destination queue.
See direct search list.
See distributed sync point resource manager.
See data set sequence number.
DS Storage Manager
See graphical user interface.
The status of the system before an initial program load (IPL) of the operating system is performed. Only dedicated service tools functions are allowed when the system is in the DST-restricted state.
See data service unit/channel service unit.
See distributed software.
See document type definition.
See data terminal equipment.
See dual-tone multifrequency.
See Data Transfer Object.
See Digital Trunk Quad Adapter.
See data terminal ready.
See detected access transmission error in.
See detected access transmission error out.
See directory user agent.
A setting requiring that an action carried out by one person be confirmed by a second person. This prevents a single person from being able to carry out actions requiring a high level of security, for example the distribution of funds or the granting of access rights. See also single authorization.
A high availability function that maintains two functionally identical copies of designated direct access storage device (DASD) volumes and automatically updates both copies every time a write operation is issued to the dual-copy logical volume (LVOL).
See multihomed host.
dual inline memory module (DIMM)
A small circuit board with memory-integrated circuits containing signal and power pins on both sides of the board. See also single inline memory module.
- A call transfer method in which the primary and secondary lines remain bridged until a call is completed.
- See trombone.
- An optional facility that produces a duplicate copy of log data.
- A method of recording IBM MQ for z/OS activity, where each change is recorded on two data sets, so that if a restart is necessary and one data set is unreadable, the other can be used. See also single logging.
A checkpointing mode that provides the alternate use of two primary checkpoint data sets (CKPT1 and CKPT2). The datasets are referred to as the to-be-read-from and to-be-written-to data sets.
See dual logging.
To make an MVS address space known to z/OS UNIX. See also undub.
In Fortran, a variable within a subprogram or statement function definition with which actual arguments from the calling program or function reference are positionally associated. See also actual argument.
dummy storage group
A type of storage group that contains the serial numbers of volumes no longer connected to a system. Dummy storage groups allow existing job control language (JCL) code to function without having to be changed.
- A representation of the contents of selected areas of main storage used to find out whether a program is functioning as intended and to analyze problems. Dumps may be recorded by CICS either as a consequence of failure detected during CICS execution, or upon explicit request. See also partition dump.
- To copy the contents of all or part of visual storage for the purpose of collecting error information.
- To record or copy, at a particular instant, data from one storage device onto another storage device to protect the data and debug the program.
- A capture of storage information at the time of an error.
- Data that is copied in a readable format from main or auxiliary storage to an external medium such as tape, diskette, or printer.
In CICS Transaction Server, a predefined name by which a dump is known. There are two types of dump code, transaction dump codes and system dump codes. See also system dump code, system dump table, transaction dump code, transaction dump table.
dump data set
A sequential data set (optional) used to record dumps of transactions (tasks) within the system. It can be formatted and printed by the CICS dump utility program (DFHDUP). If required, the user can define two dump data sets (DFHDMPA and DFHDMPB), switching between them during online execution of CICS.
- A file containing data copied from main or auxiliary storage.
- The contents of memory without any report formatting.
dump table entry
A record in the master dump table that identifies the location of a component dump table. All kernel components that need to have special data collected by the dump program need to generate a dump table entry.
dump utility program (DFHDUP)
An offline utility program that formats and prints the output from formatted dump, and prints transaction dumps. It operates in batch mode and, for formatted dumps, identifies each storage area, program, and table entry, and prints them separately, with actual and relative addresses.
dump VTOC copy data set
A copy of the volume table of contents (VTOC) of a volume dumped by DFSMShsm. The dump VTOC copy data set contains only part of the data-set VTOC entry for each data set from the original data set. This data set is written on a migration-level-1 volume.
See Data Universal Numbering System.
See Data Universal Numbering System number.
See distributed unit of work.
- Pertaining to printing on both sides of a sheet of paper. See also normal duplex, tumble duplex.
- Pertaining to the process of writing two sets of identical records in order to create a second copy of data.
- In ESS Copy Services, the state of a volume pair after Peer-to-Peer Remote Copy (PPRC) has completed the copy operation and the volume pair is synchronized.
- Pertaining to communication in which data can be sent and received at the same time. See also half-duplex.
A volume comprised of two physical devices within the same or different storage subsystems that are defined as a pair by a dual copy, Peer-to-Peer Remote Copy (PPRC) or extended remote copy (XRC) operation. A duplex pair is in neither suspended nor pending state. The operation records the same data onto each volume.
- A record that matches a master record. The duplicate record is likely to represent the same unique entity as the master record. See also clerical record, master record, nonmatched record.
- A record with categories having identical non-measure values. See also consolidation.
A subscription that is retained even while the connection from a subscribing application to a messaging resource, such as a queue, a topic, or a message, is closed. See also nondurable subscription, shared subscription.
- In SQL, a number that represents an interval of time.
- A period of time during which a project element continues. It is calculated as the finish time minus the start time.
- The elapsed time that a job is expected to take to complete (estimated duration) and actually takes (actual duration). See also CPU time, time restriction.
- In Backup, Recovery, and Media Services, the length of time that the designated media is to reside at a location before moving to the next location or returning to the home location. A duration is specified in the move policy.
A schedule that uses a minimum duration and a maximum duration to define a processing window. Duration schedules are also used to identify what percentage of a service level criteria has been processed. See also service level criteria.
See distributed unit of work.
See digital versatile disc.
See data visibility group.
See data visibility group criteria.
See Digital Video Interactive.
See dynamic VIPA.
See Decision Validation Services.
A DirectTalk programming interface used by a DVT bridge that enables integration of voice applications with Distributed Voice Technologies to provide functions such as speech recognition.
See diacritical weight.
See dense wavelength division multiplexing.
See deferred work element.
See on-premises time.
See Data Window Services.
A library of DXL programs that can be used to manipulate and manage Rational DOORS data. The library includes example programs and templates. User-defined DXL programs can also be stored in the DXL library.
- Pertaining to an operation that occurs at the time it is needed rather than at a predetermined or fixed time. See also static.
- Pertaining to events that occur at run time or during processing.
- In programming languages, pertaining to properties that can only be established during the execution of a program; for example, the length of a variable-length data object is dynamic.
- In COBOL, an access method in which specific logical records can be obtained from or placed into a mass storage file in a nonsequential manner and obtained from a file in a sequential manner during the scope of the same OPEN statement.
- A process where records can be accessed sequentially or randomly, depending on the form of the input/output request.
Assignment of system resources to a program when the program is executed rather than when it is loaded into main storage. See also step allocation.
dynamically discovered server
A server that is on-boarded automatically after it starts posting events to IBM Control Center. See also dynamic discovery.
The process of extracting targeted types of information based on the results of process simulations. This differs from static analysis, which extracts information from model elements in their static form.
dynamic application program
See replicated application program.
dynamic automatic reconfiguration (DARE)
Changes in the cluster configuration that can be made dynamically without stopping the cluster services. The changes take effect upon the next cluster synchronization. See also cluster configuration, reconfiguration.
A process that automatically cancels all activities performed by an application program that terminates abnormally. See also backout.
- The act of resolving references to external variables and functions at run time. In C++, dynamic binding is supported by using virtual functions.
A consolidation of several caching activities, including servlets, web services, and commands into one service where these activities share configuration parameters and work together to improve performance.
dynamic cache management (DCM)
A function that automatically determines which data sets will be cached based on the system load, the characteristics of the data set, and the performance requirements defined by the storage administrator. See also DASD fast write.
A type of call that locates a specified routine during run time. The routine is loaded into virtual storage. See also static call.
See dynamic class descriptor table.
dynamic class descriptor table (dynamic CDT)
A portion of the class descriptor table that can be created with RACF commands. See also static class descriptor table.
dynamic cluster isolation
The ability to specify whether the dynamic cluster runs on the same nodes as other instances of dynamic clusters, or if the dynamic cluster is the only dynamic cluster that runs on a single node.
- A virtual private network (VPN) connection that automatically refreshes the keys that keep data secure. A dynamic connection also contains proposals that allow the key server to negotiate which parameters to use with the remote key server. See also manual connection.
- A connection created at the time of sign-on or using the network connection control (NCC) record sent from another node.
The information that is available at the time that an XQuery expression is evaluated. The dynamic context consists of all of the components of the static context, plus additional components such as the context item, context position, and context size. See also expression context, static context.
In testing, data from a data pool, variables, or data correlation. See also data correlation.
- The exchange of data between programs or between a program and a data-file object. Any change the user makes to information in one program or session is applied to the identical data created by the other program. For example, with the DDE feature enabled, the user can select the copy of a spreadsheet that is embedded in a report. If the user makes changes to the copy of the spreadsheet in the report, the changes are made to the original spreadsheet file.
- The process of linking two Microsoft Windows compatible applications to share data. For example, a link can be created between a Microsoft Word document and a Query file. Query updates the data in the Word document when the data in the file changes.
Dynamic Data Format (DDF)
A format used to package LOB or XML values sent by a database server, capable of holding the actual value, a reference to the value following later in the stream of data, or a token representing the value for later retrieval. See also progressive streaming.
dynamic device reconfiguration (DDR)
A facility that allows a demountable volume to be moved, and repositioned if necessary, without abnormally terminating the job or repeating the initial program load procedure.
See MFS dynamic directory.
The process of automatically on-boarding a server after it starts posting events to IBM Control Center. See also dynamically discovered server.
See Dynamic Domain Name System.
- A domain in which the set of possible values for a type is defined. With a dynamic domain, the set of values is stored and managed outside the business object model (BOM), and changes to the set of values are automatically reflected in the business object model. When rule authors write business rules using the type, they choose from a list of values that is created dynamically and is always up-to-date.
- A dimension in which the set of members is constructed from data sources as rows are processed.
Dynamic Domain Name System (DDNS, Dynamic DNS)
A system that automatically updates DNS information when a new IP address is assigned to a network. It allows a domain name to stay linked to changing IP address, so users do not have to know the changed IP address in order to connect with another computer.
Dynamic Host Configuration Protocol (DHCP)
A communications protocol that is used to centrally manage configuration information. For example, DHCP automatically assigns IP addresses to computers in a network.
An IT infrastructure that transforms physical and digital assets into valued services. It addresses three imperatives: improve service, reduce costs, and manage risk. It focuses on seven initiatives: service management, asset management, virtualization, energy efficiency, business resiliency, security, and information infrastructure. IBM’s strategy for a dynamic infrastructure is aligned to the Smarter Planet agenda.
A method of Internet Protocol (IP) address management in which Dynamic Host Configuration Protocol (DHCP) assigns IP addresses to hosts and updates the host IP records in the Domain Name System (DNS). This method keeps DNS records current as IP address assignments change.
dynamic IP address
A temporary IP address for a transient device or logical unit on a network: for example, a personal computer. See also IP address.
- A group of products that are ordered as a unit and must be fulfilled together. The information about the products contained in a dynamic kit is controlled by an external configurator and supplied at order entry time. See also bundle, composite catalog entry, configurator.
- With Sterling Configurator dynamic kit integration, a group of SKUs that are ordered as a unit. The information about the SKUs contained in a dynamic kit is controlled by a model. The component selection is supplied by the shopper supplied at order entry time.
An element of a data model that represents a dynamic relationship between data items in data types. See also link.
- The delayed connection of a program to a routine until load time or run time.
- Linking on demand at run time. See also static linking.
- The process of linking a program in which library procedures are not incorporated into the load module but are dynamically loaded from their library each time the program is loaded.
dynamic link library (DLL)
A file containing executable code and data bound to a program at load time or run time, rather than during linking. The code and data in a DLL can be shared by several applications simultaneously. See also library, shared-object file.
dynamic link pack area (dynamic LPA)
A facility for adding additional modules to the to the link pack area (LPA) after the LPA has been created. See also link pack area.
See dynamic link pack area.
dynamic LPAR (DLPAR)
The ability to move processors, memory, and interactive performance between logical partitions without restarting a logical partition or the server. See also application provisioning, Capacity Upgrade on Demand, free pool, logical partition, managed system.
dynamic message sign (DMS)
See variable message sign.
In System Manager, the attribute of an application option that specifies whether the option can be stored in libraries and folders named at the time the installation is performed. This attribute allows an application program to be stored even if a library or folder with the same name as one of the application program's primary libraries or folders is already on the customer's system, but is used by an application program with a different registration identifier.
- A hierarchical climber that is used to send documents for approval based on the reporting structure.
- A VTAM node created dynamically. See also dynamic terminal.
dynamic node priority policy
A user-defined method for the cluster manager to select takeover nodes that receive a resource group. Dynamic node priority policies are based on the value of an RSCT Resource Monitoring and Control resource attribute, such as most available disk space. See also resource group policies.
dynamic organizational role
An organizational role that is assigned to a person by using an LDAP filter. When a user is added to the system and the LDAP filter parameters are met, the user is automatically added to the dynamic organizational role.
A method of reading from or writing to a file in a nonsequential order (see random processing) and reading from a file in a sequential order (see sequential processing) with the same OPEN statement.
dynamic program call
A transfer of control from one program or procedure to another program (*PGM) at run time. A dynamic program call is the only way that an original program model (OPM) program can connect to another OPM program. See also static program call.
dynamic query mode (DQM)
A Java-based query execution mode that provides native access to data sources. It optimizes queries to address query complexity and large data volumes. It provides advanced query capabilities, such as in-memory caching, that benefits query planning, execution, and results. See also compatible query mode.
A type of ranking in which the terms in the query are analyzed with respect to the documents that are being searched to determine the rank of results. See also ranking, static ranking, text-based scoring.
dynamic reconfiguration (DR)
The process of changing the network configuration (peripheral PUs and LUs) without regenerating complete configuration tables or deactivating the affected major node. See also dynamic reconfiguration data set.
dynamic reconfiguration data set (DRDS)
In VTAM, a data set used for storing definition data that can be applied to a generated communication controller configuration at the operator's request, or can be used to accomplish dynamic reconfiguration of NCP, local SNA, and packet major nodes. A dynamic reconfiguration data set can be used to dynamically add PUs and LUs, delete PUs and LUs, and move PUs. It is activated with the VARY DRDS operator command. See also dynamic reconfiguration.
The ability to change an existing component without restarting the server for the changes to become effective. See also hot deployment.
dynamic resource definition (DRD)
An IMS function that enables users to create, update, query, and delete the following IMS resources and their descriptors dynamically, without using the batch system definition or online change processes: application programs; databases; Fast Path routing codes; transactions.
dynamic routine-name specification
The execution of a user-defined routine whose name is determined at run time through an SPL variable in the EXECUTE PROCEDURE, EXECUTE ROUTINE, or EXECUTE FUNCTION statement.
- A method of setting paths between hosts, networks, or both by using daemons that update the routing table as needed.
- The automatic routing of a service request, a message, or an event that is based on conditions at the time of the routing.
- A way to route HTTP requests to members of a Liberty collective without having to regenerate the WebSphere plug-in configuration file when the environment changes.
dynamic routing program
A user-replaceable CICS program that selects dynamically both the system to which a routing request is to be sent and the transaction's remote name. The alternative to using this program is to make these selections when a remote transaction is defined to CICS (static routing).
In architecture, a segment whose graphics primitives can be redrawn in different positions by dragging them from one position to the next across a picture without destroying the traversed parts of the picture.
Selection and omission of logical file records performed during processing, instead of when the access path (if any) is maintained. Dynamic select/omit may also be used when no keyed access path exists.
Copy serialization in which a file or folder is backed up or archived on the first attempt regardless of whether it changes during a backup or archive. See also shared dynamic serialization, shared static serialization, static serialization.
dynamic shared object (DSO)
A mechanism that provides a way to build a piece of program code in a special format for loading into the address space of an executable program at run time. The DSO gets knowledge of the executable program symbol set as if it had been statically linked with it in the first place.
An SQL statement that is prepared and executed at run time. In dynamic SQL, the SQL statement is contained as a character string in a host variable and is not precompiled. See also deferred embedded SQL, incremental bind statement, static SQL.
A type of summarization in which the search terms are highlighted and the search results contain phrases that best represent the concepts of the document that the user is searching for. See also static summarization, summarization.
dynamic support program (DSP)
Multiprogrammed system components that are scheduled by the job segment scheduler (JSS) and implement a specified function. A DSP can be related to job execution, such as main service or output service, or it can be a background utility, such as the dump job facility.
An installation-defined table that is used to extend, modify, or delete the default processing specifications. See also table pair.
A terminal created through the Extended Terminal Option (ETO). This is a terminal that has not been defined within the IMS system definition, and for which no control blocks exist at IMS initialization time. See also dynamic node, static terminal.
dynamic threshold alteration
The process that enables a network operator to dynamically change the traffic count and temporary error threshold values associated with SDLC and BSC devices in communication controllers and network controllers.
dynamic threshold query
The process that enables a network operator to query the current settings of a traffic count or temporary error threshold value associated with an SDLC or BSC device in a communication controller or network controller.
dynamic transaction routing program (DFHDYP)
A user-replaceable CICS program that selects dynamically both the system to which a transaction routing request is to be sent and the transaction's remote name. The alternative to using this program is to make these selections when a remote transaction is defined to CICS (static transaction routing).
dynamic web project
A project that contains resources for a web application with dynamic content such as servlets or JavaServer Pages (JSP) files. The structure of a dynamic web project reflects the Java EE standard for web content, classes, class paths, the deployment descriptor, and so on.
dynamic workload manager
A feature of the on demand router that routes workload based on a weight system, which establishes a prioritized routing system. The dynamic workload manager dynamically modifies the weights to stay current with the business goals.
An output service function that controls printing or punching of data sets with characteristics that are not assigned to a specific device but are assigned to appropriate devices as they become available.