This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See optimal asymmetric encryption padding.
See origin address field.
OAM complex (OAMplex)
One or more instances of the object access method (OAM) running on systems that are part of a Parallel Sysplex. The OAM systems that are part of an OAMplex share a common OAM database in a DB2 data-sharing group.
See OAM complex.
See outbound application message store.
OAM Storage Management Component (OSMC)
A functional unit that determines where objects should be stored, manages object movement within the objects storage hierarchy, and manages expiration attributes based on the installation storage-management policy.
See origin application schedule number.
An HTTP-based authorization protocol that gives third-party applications scoped access to a protected resource on behalf of the resource owner, by creating an approval interaction between the resource owner, client, and resource server.
A process that encodes a portion of DDL statements that define database objects such as routines, triggers, views, or PL/SQL packages so that the embedded intellectual property cannot be read by users but is still understood by the database manager.
- In WebSphere MQ, a queue manager, queue, process definition, channel, namelist, authentication information object, administrative topic object, listener, service object, or (on z/OS only) a CF structure object or storage class.
- In Common Desktop Environment, any logical piece of data that has associated behavior. For example, in File Manager, files, folders, actions, and applications are all considered objects. Each type of object has specific associated actions. Typically, each object is represented as an icon.
- A single instance of a class, such as an organization, price, or contract.
- In object-oriented design or programming, an abstraction that consists of data and operations associated with that data.
- A named byte stream having no specific format or record orientation.
- Any digital content that a user can manipulate as a single unit to perform a task. An object can appear as text, an icon, or both.
- In X/Open Directory Service, data that can be identified. Each object is represented by an entry in the Directory Information Base (DIB).
- A resource or a sequence of structured fields contained within a larger entity, such as a page segment or a composed page.
- In the Network Installation Management (NIM) environment, an entry in the NIM database that represents a machine, network, or resource.
- In the Network Computing System, an entity that is manipulated by well-defined operation; for example, a disk, a file, a printer. Every object has a type and is accessed through an interface.
- One or more elements and any associated construction, finishing, and 3D data that is grouped to function as a single unit. Objects can be changed, manipulated, copied, merged, or deleted. In addition, each object can have an associated database form, which contains nongraphical attribute data.
- An item stored in a versioned object base (VOB). An object can be identified by an object-selector string, which includes a prefix that indicates the kind of object, the object's name, and a suffix that indicates the VOB in which the object resides. Examples: lbtype:REL1@/vobs/vega on UNIX and lbtype:REL1@\vega on Windows See also label.
- A self-contained piece of information in a module that can be arranged in a hierarchy and linked to show dependencies.
- A region of storage. An object is created when a variable is defined. An object is destroyed when it goes out of scope. See also instance.
- The programmatic definition of an entity, such as a folder or document. An object has properties, methods, and events, which trigger actions.
- In Report Studio, an empty information container that can be dragged to a report from the Toolbox tab and then filled with data. Reports are made up of objects, which include crosstabs, text items, calculations, graphics, and tables.
- In object-oriented design or programming, a concrete realization (instance) of a class that consists of data and the operations associated with that data. An object contains the instance data that is defined by the class, but the class owns the operations that are associated with the data.
- Anything that can be created or manipulated by using SQL, such as an index, a package, a procedure, a table, a trigger, a view, or an XSR object. See also database object, invalid object.
- In AFP architecture, a collection of structured fields, bounded by a begin-object function and an end-object function. The object can contain other structured fields containing data elements of a particular type.
- A named storage space that consists of a set of characteristics that describe the space and, in some cases, data. An object is anything that occupies space in storage, can be located in a library or directory, can be secured, and on which defined operations can be performed. Some examples of objects are programs, files, libraries, and stream files.
object access method (OAM)
A program that provides object storage, object retrieval, object-storage hierarchy management, and storage and retrieval management for tape volumes contained in system-managed libraries. OAM isolates applications from storage devices, storage management, and storage-device hierarchy management.
In architecture, a rectangular area in a presentation space into which a data object is mapped. The presentation space can be for a page or an overlay. Examples are a graphics object area, an image object area, and a bar code object area.
A specific authority that controls what a system user can do with an entire object. For example, object authority includes deleting, moving, or renaming an object. There are five types of object authorities: object operational, object management, object existence, object alter, and object reference.
object authority manager (OAM)
In WebSphere MQ on UNIX and Linux systems, WebSphere MQ for IBM i, and WebSphere MQ for Windows, the default authorization service for command and object management. The OAM can be replaced by, or run in combination with, a customer-supplied security service.
- In ODM, a stored collection of objects with the same definition, conceptually similar to an array of structures.
- In OSI, a way of grouping things of the same type, such as by country, region, or application entity. A set of common object classes has been defined by the ISO/CCITT directory standards.
- A categorization or grouping of objects that share similar behaviors and circumstances.
Machine-executable instructions, usually generated by a compiler from source code written in a higher level language. Object code might itself be executable or it might require linking with other object code files. See also source code.
object computer entry
In COBOL, an entry in the OBJECT-COMPUTER paragraph of the Environment Division that contains clauses that describe the computer environment in which the program is to be started.
Object Data Manager (ODM)
A data manager intended for the storage of system data. The ODM is used for many system management functions. Information used in many commands and System Management Interface Tool (SMIT) functions is stored and maintained in the ODM as objects with associated characteristics. See also active configuration directory.
object definition table (ODT)
A table built at compile time by the system to keep track of objects declared in the program. The program objects in the table include variables, constants, labels, operand lists and exception descriptions. The table resides in the compiled program object.
Object Distribution Manager
The application that resides in the image host and provides services to the front-end application hosts for the storage, retrieval, and routing of image objects and coded data.
object existence authority
An object authority that allows the user to delete the object, free storage of the object, save and restore the object, transfer ownership of the object, and create an object that was named by an authority holder.
- A file that contains compiled code, which can be processed by the binder to produce an executable file.
- A member file in an object library.
- The identifier or token by which a program accesses the WebSphere MQ object with which it is working.
- In graphics, the start point of an arc or lines object.
See object identifier.
- In printing, a notation that assigns a globally unambiguous name to an object or a document component. The notation is defined in international standard ISO/IEC 8824(E).
- A hierarchical sequence of numbers that uniquely identifies an object.
- An identifier, which is usually a string of integers, that uniquely identifies a particular object within a distributed system.
- An ISO-defined format for identifying elements within an OSI network. An object ID consists of a string of integers. The integers in the string can identify a particular standards body, an enterprise, or the type or value of an object. An object ID is intended to be a universal identifier of an object. Examples of values that are specified in object ID format are abstract syntaxes, application context names, and application process titles.
- The unique 4-byte value or identifier that is assigned to a data model device. Object IDs can be used in SOAP commands, for quick searching in the data model or debugging.
object information repository (OIR)
In System Manager, the information about each object that identifies which product it is associated with, such as the release level, option, and the load identifier.
- A target level of performance expressed as a measurable goal, against which actual achievement can be compared. Objectives may be expressed as a quantitative standard, value (numeric or time), or rate. See also initiative.
- A concise statement articulating a specific component of what the strategy must achieve and what is critical to its success. Objectives are best stated as action phrases which may include the means and desired results.
A component of Tivoli Intelligent Orchestrator that determines the resource requirements of each application. It also identifies trends and peaks in resource use. Each managed application can have an associated objective analyzer.
In operations research, an expression to optimize (that is, either to minimize or to maximize) while satisfying other constraints of the problem. See also feasible.
- A file used to store object modules.
- An area on a direct access storage device used to store object programs and routines.
Object Linking and Embedding (OLE)
An application protocol developed by Microsoft Corporation that allows objects created by one application to be linked to or embedded in objects created by another application.
Object Management Group (OMG)
A non-profit consortium whose purpose is to promote object-oriented technology and the standardization of that technology. The Object Management Group was formed to help reduce the complexity, lower the costs, and hasten the introduction of new software applications.
A set of instructions in machine language that is produced by a compiler or assembler from a subroutine or source module and can be input to the linking program. The object module consists of object code.
An object that consists of a namespace path and a model path. The namespace path provides access to the Common Information Model (CIM) implementation managed by the CIM Agent, and the model path provides navigation within the implementation. See also qualified name.
A programming approach based on the concepts of data abstraction and inheritance. Unlike procedural programming techniques, object-oriented programming concentrates not on how something is accomplished but instead on what data objects compose the problem and how they are manipulated.
- See object name.
- In a Tivoli environment, an absolute or relative path to a Tivoli object, similar to paths in file systems.
In the original program model (OPM), a set of instructions in machine-readable form. The object program is produced by a compiler from a source program. In the Integrated Language Environment (ILE) model, an object program is the result of binding modules together.
- In Common Object Request Broker Architecture (CORBA), the information needed to reliably identify a particular object.
- In a Tivoli environment, the object identifier (OID) that is given to an object during its creation.
object registration service (ORS)
In Tivoli NetView, a component that creates and maintains a global directory of object managers, their locations, and their protocols. The postmaster daemon uses this directory to route messages and provide location transparency for managers and agents.
A database that adds object-oriented features to a relational database, including support for user-defined data types, user-defined routines, user-defined casts, user-defined access methods, and inheritance.
- The access level assigned to TM1 objects.
- A security level that allows the user to control access to specific objects in the directory, using an access control list (ACL).
- In OnDemand, a workstation or node that is controlled by a storage manager to maintain reports in cache storage, and optionally, archive storage.
- See resource manager.
object server cache
See resource manager cache.
The space in which a graphics object is defined. A convenient point is chosen as the origin and the object is defined relative to this point. When an object is rendered by a call to the callobj subroutine, it is rendered in modeling coordinates, and the object space becomes (for that moment) the same as the modeling space.
Object Storage and Retrieval (OSR)
A component of the object access method (OAM) that stores, retrieves, and deletes objects. OSR stores objects in the storage hierarchy and maintains the information about these objects in DB2 databases.
object storage database
A DB2 database that contains an object directory for an object storage group, a storage table for objects less than or equal to 3 980 bytes, and a storage table for objects greater than 3 980 bytes.
object storage group
A type of storage group that contains objects on a direct access storage device (DASD), a tape, or an optical volume. See also storage group.
object storage hierarchy
A hierarchy consisting of objects stored in DB2 table spaces on a direct access storage device (DASD), on optical or tape volumes that reside in a library, and on optical or tape volumes that reside on a shelf. See also storage hierarchy.
- A categorization or grouping of object instances that share similar behaviors and characteristics.
- In CDE, a desktop mechanism used to associate particular data files with the appropriate applications and actions. Object typing defines the criteria for typing the file (such as name or contents), the appearance (the icon used in File Manager), and the behavior of the object (for example, what happens when you double-click it).
- In query management, the substring following the query command name that specifies the type of query object to be processed.
Pertaining to a line style in which connections between nodes in an application diagram are drawn by taking the shortest route possible while attempting to avoid having lines that intersect other nodes.
The property of an object, which is derived from data stored with the object, that allows source to be retrieved from the object, allows the object to be re-created without being recompiled, and allows the object to be symbolically debugged.
See owner center.
In SQL replication, pertaining to a replication configuration that contains target servers that are not always connected to the network. Using this configuration, users can connect to a primary data source for a short time to synchronize their local databases with the data at the source.
See Operator Communication Control Facility.
An instance of an application in the long-term plan or current plan. An application occurrence is one attempt to process that application. Occurrences are distinguished from one another by run date, input arrival time, and application ID. For example, an application that runs four times a day is said to have four occurrences per day.
One or more application occurrences added to the long-term plan or current plan. An occurrence is defined as belonging to a particular application group, which is specified in the group definition field of the application description or job description.
See optical configuration database.
See offline control data set.
See object code only.
See Optical Character Recognition-A.
See Optical Character Recognition-B.
- A byte composed of eight binary elements.
- Pertaining to a selection, condition, or choice that has eight potential values or states.
- In Internet Protocol (IP) addressing, one of the four parts of a 32-bit integer presented in dotted decimal notation. See also dotted decimal notation.
See origin-destination assignor indicator.
See Open Database Access.
See Open Database Connectivity.
odd parity bit
A check bit that is usually generated or included in a parity-checking algorithm to make the total number of bits in a bit pattern an odd number. See also even parity bit.
odd positive acknowledgment
Odette File Transfer Protocol (OFTP)
A packet-oriented file transfer protocol that facilitates electronic data interchange between trading partners. The protocol supports both direct peer-to-peer communication and indirect communication using a VAN.
A packet-oriented file transfer protocol that facilitates electronic data interchange between trading partners. The protocol supports both direct peer-to-peer communication and indirect communication using a VAN.
See object definition file.
See outboard data link control.
See on demand operating environment.
See open data path.
See object definition table.
See original equipment manufacturer.
- A message sent or an event generated in response to a monitored condition. For example, an offense will provide information on whether a policy has been breached or the network is under attack.
- A violation of a country or region's criminal law.
The price of a product, in one or more currencies, along with a set of conditions such as an effective time range or an acceptable quantity range, which must be satisfied in order to use the price.
- A template used to describe one or more services, with guaranteed service levels, which forms the basis for service level agreements (SLAs).
- An item or a service that can be ordered by a user from a catalog.
- The element or integrated set of elements (hardware, software, services) designed to satisfy the wants and needs of current and/or prospective customers. A solution is the application of the offering in a specific customer environment.
See project development team.
A price at which items are offered by a store. The offer price is the final price paid, before taxes, discounts, and shipping. See also list price.
A setting that defines the frequency with which an offer is updated (monthly, weekly, or daily), the amount of data that is considered, the set of products for which recommendations will be generated, the number of recommendations per product (flat file only), and the delivery method.
- Activated, with regard to a telephone set. On a public switched system, a data set that automatically answers is said to go off-hook. See also on-hook.
- A telephone line state, usually induced by lifting a receiver, in which the line is ready to make a call.
Pertaining to the operation of a device that is not under the control of a system. See also online.
A backup of the database or table space that is made while the database or table space is not being accessed by applications. During an offline backup, the backup database utility acquires exclusive use of the database until the backup is complete. See also online backup.
A carrier that subscribes to Sterling TMS but does not accept tenders from certain shippers that use Sterling TMS. See also nonprofiled carrier.
offline control data set (OCDS)
In DFSMShsm, a Virtual Storage Access Method (VSAM) key-sequenced data set (KSDS) that contains information about tape backup volumes and tape migration-level-2 volumes. See also control data set.
Maintenance activities that can occur only when user access to a database is interrupted. See also online maintenance.
offline nodelocked license
A copy of the concurrent-offline license that is installed on a portable computer that is disconnected from the network. There cannot be more than one offline nodelocked license for the same product, same product version, same product features, and same nodelock directory on the same machine (same target ID). There can be several nodelock directories on the same machine. The offline nodelocked license is local to the portable computer where the application has been installed.
- To move data from an operational database to a private sandbox to complete additional development and analysis on the data without impacting the operational database.
- To move jobs and work off work queues in order to remove them from contention for system resources or off spools to free system work space.
Pertaining to a response that is given in response to a question that is outside of the respondent’s final routing. An off path response usually happens when a respondent realizes, after answering the question, that he or she incorrectly answered a previous question on which a routing decision was based, and then goes back to change the incorrect answer, thus taking a different route through the questionnaire. See also on path, routing control.
Pertaining to software that is accessed through a remote computer or over the Internet. See also cloud computing.
- The number of measuring units from an arbitrary starting point to some other point.
- Values in the ranges 1 to 999 and -1 to -999 that indicate on which days of a calendar period an application runs. An offset is sometimes called a displacement.
- In Pascal, the selection mechanism in the SPACE data type; an element is selected by placing an integer value in brackets. The origin of SPACE is based on zero.
- An optional time gap between the event trigger and cutoff.
offset-based run cycle
A run cycle that uses a combination of user-defined periods and offsets. For example, an offset of 3 in a period of 15 days is the third day from the beginning of the period. It is more practical to use offset-based run cycles when the cycle is based on cyclic periods. See also rule-based run cycle, run cycle.
See online forward recovery.
See Odette File Transfer Protocol.
See Overlay Generation Language.
OGSA Policy Service
An industry-standard interface that enables developers to consistently define policies within a network environment. The OGSA Policy Service follows the Internet Engineering Task Force (IETF), policy-based network architecture and implements the behavior of the Open Grid Services Architecture (OGSA) specification.
See operator instruction.
See operator identification card.
See Object Instance Identifier.
See object information repository.
See online analytical processing.
A user application that requests information from OLAP servers and provides two-dimensional or multidimensional displays. Users can modify, select, rank, and calculate information for visualization and navigation purposes using OLAP clients.
See online log data set.
See Object Linking and Embedding.
See online image copy.
See online transaction processing.
See origin logical unit.
See Object Management Group.
A system function that determines which records from a physical file are to be omitted from a logical file. See also select function.
A marketing and merchandising solution that engages customers across communication channels and provides retailers with customer insights-based planning and analytical capabilities.
See order management system.
See Operations Management team.
- Enabling a store to process transactions in an active or live Sterling Store system.
- An approach to equipping new employees and socially integrating them into an organization.
- The process of moving users to cloud mail servers.
- In Cloud/SaaS offerings, the process during which a user is set up to use the application or service.
A licensed program that provides a set of archive features that allows you to store large volumes of data or retrieve selected data. This data can be on disk, can be optical, or can be on tape storage media. OnDemand provides computer output to laser disk and extended archiving functions for a variety of data types.
on demand localization pack
A run-time pluggable localization pack that can be located, installed and used by a running program without requiring any user intervention beyond getting the user or administrator to accept the use of the localization pack.
A space management function that performs near immediate space management on eligible SMS-managed volumes that have exceeded the specified volume high threshold, instead of waiting for interval migration to run at the top of each hour. Data sets are migrated from the eligible volume until the low threshold is reached or there are no more eligible data sets. See also event-driven migration.
on demand operating environment (ODOE)
The technology infrastructure needed to support an on demand business. The on demand operating environment is integrated, uses open standards, is virtualized, and has autonomic capabilities. See also autonomic, open standard.
on demand router
A proxy server that is the point of entry into the product environment and is a gateway through which prioritized HTTP requests and Session Initiation Protocol (SIP) messages flow to the middleware servers in the environment.
- A protocol that is used by a sync point manager to commit a transaction when only resources that are managed as a single entity are changed during the transaction. For example, one-phase commit would be used when a single database on a single system is changed. If either the system or communications fail during a one-phase commit, the sync point manager may not be informed of whether the changes were committed or rolled back.
- A protocol with a single commit phase, that is used for the coordination of changes to recoverable resources when a single resource manager is involved.
The diminished radix complement in the pure binary numeration system. The ones complement is derived by replacing all of the zeros with ones and all of the ones with zeros in a binary number. In a ones complement system, the ones complement of a number n is -n.
A bracket in which data is sent from one NAU to another in a single chain with begin bracket, conditional end bracket, and exception response requested. When one-way brackets are used on CP-CP sessions, they are always sent on the contention-winner session.
In X.25 communications, a logical channel that allows incoming calls only or outgoing calls only. See also two-way channel.
A conversation in which data is sent from one transaction program (the source) to another (the target) with no response requested and that is released after the data is sent. If the source TP terminates as soon as it releases the conversation, the data may still be in transit; thus, the source and target TPs are not necessarily active at the same time.
- A function that converts a message into a fixed string of digits.
- An algorithm that converts processing data into a string of bits; known as a hash value or a message digest.
- In cryptography, pertaining to a type of algorithm that can be applied to a buffer of data to produce a fixed string of digits. Cryptographic programs often apply one-way hash algorithms against a set of data and often compare the results with previously generated hash values.
The process of monitoring events that trigger the necessity to publish a new GTIN or update an item for an existing GTIN, and continuing the synchronization of party and item data with trading partners' data through the Global Registry.
- Deactivated, in regard to a telephone set. A telephone not in use is on-hook. See also off-hook.
- A telephone line state, usually induced by hanging up a receiver, in which the line is ready to receive a call.
- Pertaining to a user's access to a computer by way of a terminal.
- Pertaining to the operation of a functional unit or device that is under the control of the system or of a host. See also offline.
online analytical processing (OLAP)
The process of collecting data from one or many sources; transforming and analyzing the consolidated data quickly and interactively; and examining the results across different dimensions of the data by looking for patterns, trends, and exceptions within complex relationships of that data.
A backup of the database or table space that is made while the database or table space is being accessed by other applications. See also offline backup.
A collection of catalog groups or catalog entries available for display and purchase at an online store. See also master catalog.
An IMS function that supports the adding, changing, or deleting of IMS resources online such as transactions, database directories, program directories, DMBs, PSBs, and Fast Path routing codes without stopping the system to define them. See also global online change, local online change.
- The process of creating an image copy while the database is online.
- The image copy created by the online image copy process.
online log data set (OLDS)
A data set on direct access storage that contains the log records written by an online IMS system or Database Control (DBCTL). See also system log data set.
Maintenance activities that can occur while users are connected to a database. See also offline maintenance.
online table move
A method for moving data in a table to a new table in the same database, in which the original table remains accessible for select, insert, update, and delete operations. The table is offline for only a few seconds at the end of the online move operation.
online transaction processing (OLTP)
A type of interactive application in which requests that are submitted by users are processed as soon as they are received. Results are returned to the requester in a relatively short period of time.
A request unit for which the request header (RH) begin chain indicator and RH end chain indicator are both on. See also RU chain.
The process of installing and configuring a software application and all of its components onto a customer's local server. See also deployment.
The average amount of time that is spent at a location when picking up or delivering a shipment. The on-premise time is applied to every order or shipment that is picked up or delivered at that location. See also processing time.
An explicit formal specification of the representation of the objects, concepts, and other entities that can exist in some area of interest and the relationships among them. See also taxonomy, Web Ontology Language.
- In bar codes, the optical property of a substrate material that minimizes showing through from the back side or the next sheet.
- The degree to which an image obscures the background of a screen as it paints.
opaque data structure
A data structure used internally by one functional unit of code but exported for limited external use in another functional unit of code. The external uses must avoid accessing the structure's components or making assumptions about its constitution.
- A data type whose inner structure is not visible to the database server. Opaque types that are not built-in need user-defined routines and user-defined operators that work on them. See also data type.
- In XDR, bytes of a fixed size that are not interpreted as they pass through the data streams between computers.
See originating point code.
See operation code.
- To establish a temporary logical connection between a file and a running program. The connection exists until the program closes the connection or the program terminates.
- To establish access to an object, such as a queue, topic, or hyperlink.
- To make a file available to a program for processing.
An HTTP-based authorization protocol that gives third-party applications scoped access to a protected resource on behalf of the resource owner, by creating an approval interaction between the resource owner, client, and resource server.
open box item
A product that is obsolete, a display model, or has been returned by a customer after the box had been opened. Such products are inspected and sold as a high-quality product at a significant discount.
Open Database Access (ODBA)
A callable interface that can be used by a z/OS application program to issue DL/I calls to an IMS DB system. The application program must use the Resource Recovery Services (RRS) of z/OS as a sync point manager.
Open Database Connectivity (ODBC)
A standard application programming interface (API) for accessing data in both relational and nonrelational database management systems. Using this API, database applications can access data stored in database management systems on a variety of computers even if each database management system uses a different data storage format and programming interface. See also Java Database Connectivity.
open data path (ODP)
A control block created when a file is opened. An ODP contains information about the merged file attributes and information returned by input or output operations. The ODP only exists while the file is open. See also shared file.
See UNIX System Services.
OpenEdition MVS file system
See z/OS file system.
open feedback area
In the C language, an area containing general information about the opened file, including its name, library, and file type. This area also contains specific information about the file type, which applicable fields depend on, and about each device and communications session defined for the file.
open file description
A record of how a processor or a group of processes are accessing a file. Each file descriptor refers to exactly one open file description, but an open file description can be referred to by more than one file descriptor. A file offset, file status, and file access modes are attributes of an open file description. X/Open. ISO.1.
In COBOL, the condition of a file after the program processes an OPEN statement for that file and before the program processes a CLOSE statement for that file. The particular open mode is specified in the OPEN statement as either INPUT, OUTPUT, I-O, or EXTEND.
Open Platform Trust Service (OpenPTS)
An open implementation of the Platform Trust Service that provides the basis for collector and verifier capabilities that are provided by the PowerSC Trusted Boot feature.
See Open Platform Trust Service.
A registration process in which users can register their workstations as client nodes with the server. See also closed registration.
See Open Services for Lifecycle Collaboration.
Open Services for Lifecycle Collaboration (Open Services, OSLC)
An open community that facilitates collaboration and standardization across the software delivery lifecycle by building practical specifications for integrating software.
Open Shortest Path First (OSPF)
A link-state routing protocol that was developed for IP networks and is based on the Shortest Path First (SPF) algorithm. Open Shortest Path First is an Interior Gateway Protocol.
- A nonprofit research and development organization with these goals: to develop specifications and software for use in an open software environment; and to make the specifications and software available to information technology vendors under fair and equitable licensing terms.
- An industrial consortium that produces both specifications and software products.
Pertaining to software whose source code is publicly available for use or modification. Open source software is typically developed as a public collaboration and made freely available, although its use and redistribution might be subject to licensing restrictions. Linux is a well known example of open source software.
Open Source Vulnerability Database (OSVDB)
Created by the network security community for the network security community, an open source database that provides technical information on network security vulnerabilities.
See Open Secure Shell.
A standard that is documented, publicly available, and usually free. Open standards allow all technologies to connect and integrate, and allow IT to become more modular. As such, they are key to the on-demand operating environment. See also on demand operating environment.
A system that complies with industry-defined interoperability standards. An open system can be connected to other systems complying with the same standards. See also Fibre Channel Protocol, Small Computer System Interface.
Open Systems Adapter (OSA)
An integrated IBM mainframe hardware feature that combines the functions of an I/O channel with the functions of a network port to provide direct connectivity between mainframe applications and their clients on the attached network.
open systems interconnection network (OSINET)
A test network sponsored by the National Institute of Standards and Technology. The goal of OSINET is to provide a common set of OSI protocols that allow all participants to communicate with each other for development and research, and for interoperability testing.
open systems interconnection reference model (OSI-RM)
The seven-layer basic reference model that ISO 7498 (CCITT X.200) uses to describe how open systems should act and interact. The three primary kinds of interactions described in that reference model are the interactions: (a) inside layers, (b) between layers, and (c) between open systems.
open task control block (open TCB)
A task control block that is dedicated to a single task. Multiple open TCBs can run concurrently in the address space. Several different types, or modes, of open TCBs are available for specific purposes. An application that is running on an open TCB cannot rely on quasi-reentrancy to protect shared resources from concurrent access by another program.
See open task control block.
Open Transaction Manager Access (OTMA)
A component of IMS that implements a transaction-based, connectionless client/server protocol in an MVS sysplex environment. The domain of the protocol is restricted to the domain of the z/OS Cross-System Coupling Facility (XCF). OTMA connects clients to servers so that the client can support a large network (or a large number of sessions) while maintaining high performance. See also IMS Connect.
Open Virtual Appliance
See Open Virtualization Format Archive.
Open Virtualization Format (OVF)
A Distributed Management Task Force (DMTF) standard that describes a packaging format for virtual server images. See also Open Virtualization Format Archive, virtual appliance, virtual server collection.
Open Virtualization Format Archive (OVA)
A package that is deployed in a virtual environment to create virtual appliances. The OVA package is an archive file that contains the OVF directory. See also Open Virtualization Format.
- Information entered with a command name that defines the data on which a command processor operates and that controls the running of the command processor. See also definition statement, keyword, keyword parameter, parameter.
- An argument to a command that is generally used as an object supplying information to a utility necessary to complete its processing. Operands generally follow the options in a command line.
- An entity on which an operation is performed.
In finance communications, the diskette that contains the operating image. The operating diskette is used to load the operating image to the main storage of the 4701 Finance Communication Controller.
A setting that determines the degree of automation and manual intervention required in creating and approving deployment requests. There are three modes: automatic, semi-automatic, and manual. An operating mode can be defined at the global, application, and tier level.
operating system template
A set of installation and configuration data that z/VM Center uses as a source for creating operating system instances. Operating system templates are created from master systems.
- In Enterprise Service Tools, a service that can be requested from an object to effect behavior.
- An implementation of functions or queries that an object might be called to perform. See also method.
- A specific action (such as add, multiply, or shift) that the computer performs when requested.
- In object-oriented design or programming, a service that can be requested at the boundary of an object. Operations include modifying an object or disclosing information about an object.
- A set of functions and their specified properties to which calls can be made. See also endpoint, entry point.
- A function in an application (step processor or automated process) that processes work items in a queue. The operation is defined as a property of the queue and includes as parameters any data required for input from or output to a work item.
- A business process that invokes action against a participant. When an operation is invoked, it delivers a request message and waits for a response. If a fault is communicated, the operation fails.
- A unit of work that is part of an application and that is processed at a workstation.
- Data that is used to run the day-to-day operations of an organization.
- Data that is collected by an application during its operation. An application can store its operational data in many formats, such as relational databases, log files, and spreadsheet files. It is "live" data, as opposed to the historical data in the central data warehouse.
Information about an argument's size, shape, and type, which is passed by the system to the called procedure. This information is useful when the called procedure cannot precisely anticipate the form of the argument, for example, different types of strings.
One of the four member types in an installation, the operational member includes the communications, storage (server and client), identity components, and the visibility receiver (exchange tracking service). Optionally, it includes a perimeter server configuration for use by communications connections.
Metadata that describes the events and processes that occur and the objects that are affected when a job is run. See also operations database.
- A numeric code that tells the processor which operation to perform.
- In RPG, a word or abbreviation, specified in the calculation specifications, that identifies an operation.
- A code used to represent the operations of a computer.
operations and administration
The Tivoli management discipline that addresses the automation of activities that ensure the operational integrity and reliability of a network computing system. See also availability management, deployment management, security management.
An attribute which when assigned, allows the user access to all data sets, unless specifically restricted, and general resources in RACF general resource classes, unless specifically restricted, which are defined with OPER=YES.
A feature of System i Access for Windows that provides the ability for a System i console to be either a local or a remote personal computer. With Operations Console, a system administrator, for example, can access the console from home. See also local console, remote console, twinaxial console.
A component of the metadata repository that stores both the operational metadata and the information about the system resources that were used when a job is run for the product modules in the InfoSphere Information Server suite. See also metadata repository, operational metadata.
Operations Management team (OMT)
The Operations Management team is responsible for a portfolio of applications that address a specific segment of the business. The team manages and monitors solution performance and recommends corrective actions. It identifies new requirements, executes Operations Management management plans and end of life activities.
Operations Manager (OM)
In an IMSplex, a Common Service Layer (CSL) component that provides an application programming interface (API) for automated operator programs (AOPs). OM receives commands from AOPs, routes the command to IMSplex members, consolidates commands responses, and sends the responses to the AOP, embedded in XML tags.
A defined role in WebSphere Commerce that manages order processing, ensuring that orders are properly fulfilled, payment is received, and orders are shipped. The operations manager can search for customer orders, view details, manage order information, and create and edit returns. See also sales manager.
A web page that contains portlets that can cooperate to facilitate comprehensive information supply and interaction at operations level for monitoring incoming data from data sources, and for responding to incoming data.
- An enterprise search user who has the authority to observe, start, and stop collection-level processes.
- A symbol (such as +, -, or *) that represents an operation (in this case, addition, subtraction, multiplication).
- In Ada language, an operation that has one or two operands. A unary operator is written before an operand; a binary operator is written between two operands. This notation is a special kind of function call. An operator can be declared as a function. Many operators are implicitly declared by the declaration of a type (for example, most type declarations imply the declaration of the equality operator for values of the type).
- A user defined in the system to receive notifications when specified audit messages are generated.
- A person who operates the IBM Endpoint Manager Console. Ordinary operators can deploy Fixlet actions and edit certain computer settings.
- In the C, COBOL, and REXX languages, a token that specifies the type of action to be done on one or more terms. The four types of operators are concatenation, arithmetic, comparison, and logical.
- In an access plan for an SQL or XQuery statement, a token that specifies the type of action that must be performed on data or on the output from a table or an index when the access plan is executed.
- A runtime object library that is part of the parallel engine and that executes the logic as defined in its corresponding stage. See also connector, stage.
- A program that processes tuples in an incoming stream and produces an output stream as a result. An operator can have any number of input ports and any number of output ports. See also composite operator, custom operator, data flow graph, operator invocation, primitive operator, tuple.
- A built-in function that assigns a value to a variable, performs an operation on a value, or specifies how two values are to be compared in a policy. See also assignment operator, Boolean operator, comparison operator, mathematic operator, string operator.
- A building block that lets the user compare or establish relationships between the different parts of business rule statements.
One of the operator-class support functions or operator-class strategy functions that constitute an operator class. For user-defined operator classes, the operator-class functions are user-defined functions.
operator-class strategy function
An operator-class function that can appear as a filter in a query. The query optimizer uses the strategy functions to determine if an index of a particular secondary access method can be used to process the filter.
operator control function
In MFS, the means by which a terminal operator controls the display of output messages. Specific operator control functions are provided by IMS, but their use must be defined by the user in an operator control table.
operator control table
In MFS, a user-defined table of operator control functions; when a table is used, a specific control function is invoked when the input device data or data length satisfies a predefined condition.
- An overloaded C++ operator that is either a member of a class or takes at least one argument that is a class type or a reference to a class type.
- An arithmetic function that has a corresponding operator symbol. An operator function processes one to three arguments and returns a value.
operator identification (OPID)
A 1-to-3 character code that is assigned to each operator and is stored in the operator's terminal entry in the CICS terminal control table (TCTTE) when the operator signs on.
See operator invocation.
operator logical paging
An MFS facility that allows the device operator to request a specific logical page of an output message. See also logical paging.
An XML document that describes the basic syntactic and semantic properties of a primitive operator. See also primitive operator.
operator orientation point model
See transfer station.
See control panel.
operator privilege class
A privilege class that gives an administrator the authority to disable or halt the server, enable the server, cancel server processes, and manage removable media. See also privilege class.
operator station task (OST)
In Tivoli NetView for OS/390, the task that establishes and maintains the online session with the network operator. There is one operator station task for each network operator who logs on to Tivoli NetView for OS/390.
See operator identification.
See original program model.
See open destination.
- A deficiency or condition that is observed during the condition assessment and that requires action to remedy.
- The potential to sell products or services to a customer. A quote or several related quotes are associated with a single sales opportunity.
optical character recognition (OCR)
Character recognition that uses optical means to identify graphic characters. See also magnetic ink character recognition.
optical configuration database (OCDB)
The optical library table, the library slot table, the optical drive table, the optical volume table, and the tape volume table that reside in a DB2 database and describe the current object access method (OAM) configuration.
optical flash frame
See flash frame.
optical forms flash
See forms flash.
optical forms overlay
See forms overlay.
A set of optical disk drives and optical disks defined to a source control data set (SCDS). An optical library can be a physical library with the optical drives and optical disks residing within the same storage device, or a pseudo library that consists of operator-accessible drives and shelf-resident optical disks.
Storage space on an optical disk, identified by a volume label. See also shelf-resident optical volume.
- A System i system area network (SAN) that allows high-speed links between systems in a System i cluster. OptiConnect provides three hardware technologies (SPD OptiConnect, high-speed link (HSL) OptiConnect, and virtual OptiConnect) that can exist simultaneously on a single cluster node.
- A feature of the IBM i operating system that allows a user to connect multiple System i systems by using SPD bus, high-speed link (HSL) loop, or virtual interpartition technologies.
optimal snowflake schema
A snowflake schema, in which each dimension is represented by a table. Each row represents the leaf level members of the dimension and has columns that contain foreign keys to access all of the higher levels of the dimensions. See also metadata schema.
In operations research, a solution to a problem that optimizes the objective function (whether linear or quadratic) and satisfies all the other constraints of the problem. See also feasible.
optimal star schema
A variant of the star schema that includes a main dimension table with keys to all the levels of the delivered hierarchy. The main dimension table contains the description of only the leaf level. To save storage space, the descriptions of the higher levels reside in supplementary tables. See also metadata schema.
optimistic concurrency control
See optimistic locking.
A locking strategy whereby no lock is held between the time that a row is selected and the time that an update or a delete operation is attempted on that row. See also currently committed, pessimistic locking.
- A feature within the application that uses bids, bidding rules, and scenarios to provide the best possible total sourcing cost.
- The discipline of attacking intractable problems and reducing them to manageable proportions.
- The process of achieving improved runtime performance or reduced code size of an application. Optimization can be performed by a compiler, by a preprocessor, or through hand tuning of source code.
The level of efficiency for processing a program, which is determined by the application programmer. When the code is optimized on the system, the system uses processing shortcuts to reduce the amount of system resources necessary to produce the same output. The processing shortcuts are then translated by the system into machine code, which allows the program to run more efficiently.
An XML document that contains optimization guidelines for one or more DML statements. An optimization profile is used to provide explicit guidelines to the query optimizer when the performance of DML statements is not acceptable and other tuning options are ineffective. See also optimization guideline.
optimized dialogue transfer
In OSI, a quality-of-service value provided by the session layer that enables the concatenation of multiple application entity requests--such as data and control information requests--when transferring them. The concatenation increases data throughput.
optimized SQL text
SQL text, produced by the Explain facility, that is based on the query actually used by the optimizer to choose the access plan. This query is supplemented and rewritten by the various components of the SQL compiler during statement compilation. The text is reconstructed from its internal representation and differs from the original SQL text. The optimized statement produces the same result as the original statement.
A special-purpose hardware component or appliance that can perform a limited set of specific functions, with optimized performance when compared to a general-purpose processor. Because of its limited set of functions, an optimizer is an integrated part of a processing environment, rather than a standalone unit. One example of an optimizer is the IBM Smart Analytics Optimizer for DB2 for z/OS.
optimum block size
For data sets that do not use the Virtual Storage Access Method (VSAM), the block size that would result in the smallest amount of space used on a device, taking into consideration record length and device characteristics.
- An item of either hardware or software that may be purchased in addition to the basic system.
- A specification in a statement that can influence the running of the statement.
- A parameter that determines how a message is to be processed.
Within a group type, a component that can be defined to represent a data object that is not required to be present in the data. The component range maximum specifies how many occurrences of the data object might optionally exist.
Software that is not automatically installed on a system with the Base Operating System (BOS). Optional software can be products packaged and sold with BOS. Optional software can also be separately purchased software products that are specially ordered and not sold as part of BOS.
option class group
In Sterling Configurator Visual Modeler, a collection of option classes or nested option class groups that represent entities that can be reused without change in any number of item models and option classes.
An entry in a VSAM data set that contains transmission options used by IP PrintWay to transmit data sets to a print queue in a TCP/IP network. Each option entry can also contain NetSpool parameters that specify data set characteristics for use by NetSpool. See also options data set.
A 1-character field that is passed with an output data record from a program to the system that is used to control the output function, such as controlling which fields in the record are displayed.
In Sterling Configurator Visual Modeler, an orderable part or service pertaining to an item model. Option items are members of either an option class or an option item group. Option items are usually associated with properties.
See command line.
options data set
In IP PrintWay prior to OS/390 V2R8, a VSAM data set containing one or more options entries. See also option entry.
- A set of functions that may be supported by products that implement a particular architecture. A product may support any number of option sets or none. For each option set supported, all functions in that set are supported. See also base set.
- A named group of options and their settings that can be specified in a request or in another option set, thereby eliminating the need to specify each option individually.
oracle padding attack
In symmetric cryptography, an attack that gains information from an oracle about whether the padding for an encrypted message is correct. When error messages are exposed an attacker can decrypt messages through the oracle without the encryption key. In these cases, the attacker uses the oracle's key.
See Object Request Broker.
ORB bootstrap port
See Remote Method Invocation.
The process of making real-time decisions about where and when to allocate resources to support business priorities and maintain service levels, based on information collected about the data center environment.
- A collection of items that are being delivered from one origin to one destination. A shipment consists of one or more orders.
- To place items in an arrangement in accordance with specified rules.
- A request for goods or services such as a purchase order, sales order, work order, and so on.
- A stated intention, either verbal or in writing, to engage in a commercial transaction.
- A code used to format and define data for display or printing. In contrast to a sequence, an order need not be linear; for example, the ordering of a hierarchy of items.
- A written agreement between a supplier and a buyer to provide goods, services, and contingent staff at a negotiated cost or rate for a stipulated time period.
A full list of quotes and orders that have been submitted to an exchange for a symbol. See also symbol.
A chart item whose position is maintained within a sequence. The movement of an ordered item is restricted such that it cannot be dragged beyond neighboring ordered items. See also controlling item, free item, item.
- In Fibre Channel technology, a transmission word that uses 8B/10B mapping and begins with the K28.5 character. Ordered sets occur outside of frames, and include: frame delimiters, which mark frame boundaries and describe frame contents; primitive signals, which indicate events; and primitive sequences, which indicate or initiate port states. Ordered sets are used to differentiate Fibre Channel control information from data frames and to manage the transport of frames. See also data word.
- A field/variable whose values represent categories with some intrinsic ranking (for example, levels of service satisfaction from highly dissatisfied to highly satisfied). Examples of ordered sets include attitude scores representing degree of satisfaction or confidence and preference rating scores.
In DB2 XQuery, a mode, either ordered or unordered, that affects the ordering of the result sequence that is returned by path expressions, union expressions, intersect expressions, and except expressions and by FLWOR expressions that do not have an order by clause.
The orderly deactivation of VTAM and its domain. An orderly closedown does not complete until all application programs have closed their access method control blocks (ACBs). Until then, RPL-based operations continue; however, no new sessions can be established, and no new ACBs can be opened. See also cancel closedown, quick closedown.
An option for disconnecting CICS from DBCTL using the CDBC transaction. It allows all existing DBCTL tasks to be completed before CICS is disconnected from DBCTL. See also immediate disconnection.
The standard unit by which an item is ordered that can differ from the issue unit. See also issue unit.
See ordered set.
An uppercase letter followed by zero or more characters, each of which is an uppercase letter, a number, or the underscore character. An ordinary identifier should not be a reserved word.
- An entity where people cooperate to accomplish specified objectives, such as an enterprise, a company, or a factory.
- An organizational unit that contains domains, spaces, and users in the Cloud Foundry infrastructure and can be used to store and track application resources.
- In the Distributed Computing Environment (DCE), the third field of a subject identifier.
- A user-defined object that is created to emulate a business structure.
- In DCE security, data that associates a named set of users who can be granted common access rights that are usually associated with administrative policy.
- A hierarchical arrangement of organizational units, such that each user is included once and only once. See also organizational unit.
- A business entity with a specific role or roles that interact with other organizations in a supply chain to conduct business. An organization represents any unit of a business whether it is a company, legal entity, a business group, sales organization, purchasing organization, or warehouse.
- The grouping methodology for users in Bluemix. Orgs are used to manage quotas. Users in an org share memory and service instance quotas. See also domain, space.
- The entity that owns APIs or applications that use APIs. A provider organization owns APIs and associated plans, and can additionally own applications. A consumer organization owns only applications. An organization has at least one owner. An organization can be a project team, department, or division.
- A record that identifies a unique legal entity. The data set for an organization includes information that companies or other distinct legal entities might share, such as calendars, vendors, and financial information. An organization can contain one or more sites. See also site.
Organizationally Unique Identifier (OUI)
An IEEE-standards number that identifies an organization with a 24-bit, globally unique, assigned number referenced by various standards. The OUI is used as part of the worldwide ID (WWID) in the family of 802 LAN standards, such as Ethernet and token ring, and in Fibre Channel standards.
- A logical group of principals that provide a set of permissions. Access to operations is controlled by granting access to a role. An organizational role can also represent a group of principals based on business job title or other business-related attributes. See also role.
- In identity management, a list of account owners that is used to determine which entitlements are provisioned to them.
- A body whose data is to be kept separate from that of other, similar bodies. WebSphere BI for FN uses OUs to control access to resources, and to ensure data segregation. Typically, OUs are used to represent different financial institutions, or different departments within a financial institution.
- An Active Directory container object used within domains. An organizational unit is a logical container into which users, groups, computers, and other organizational units are placed. It can contain objects only from its parent domain. An organizational unit is the smallest scope to which a Group Policy object can be linked, or over which administrative authority can be delegated.
- A unit within an organization, such as a company, that identifies a particular set of users. See also organization.
The highest level certifier in Domino, which certifies users and servers at the Organization (O) level, for example, CN=Samantha Daryn, O=Renovations. Entities certified below the organization level are trusted.
A non-personal name that refers to a structured body of one or more persons that exists to perform some common function. Organization names typically include some type of indicator or pattern or words that identify them as non-personal names.
- The position of a device relative to the user. Most mobile devices support two different orientations, landscape or portrait. See also accelerometer.
- The orientation of a stream refers to the type of data which may pass through the stream. A stream without orientation is one on which no stream I/O has been performed.
- In printing, the number of degrees an object is rotated relative to a reference; for example, the orientation of an overlay relative to the logical page origin, or the orientation of printing on a page relative to the page coordinates. Orientation usually applies to blocks of information, whereas character rotation applies to individual characters. See also character rotation.
- The point in a coordinate system where the axes intersect. Examples of origins are the addressable position in an Xm, Ym coordinate system where both coordinate values are zero and the character reference point in a character coordinate system.
- A position from which the placement and orientation of an element is specified.
- The starting point of a shipment route or contract lane.
- The location where a message was initially produced.
- The point at which circles, rectangles, and text can be placed when they are entered on a drawing. The number of the origin corresponds to its relative numeric location on the numeric keypad.
- The absolute storage address of the beginning of a program or block.
- An external logical unit (LU) or application program from which a message or other data originates. See also destination.
- The creator of a DR Trow. The origin can take one of three forms: ARSRSCHD (the DRT row is created by an ODF program), a string that is prefixed by UR (the DRT row is created by an ODF CICS transaction), or any other string (the DRT is created by a source that is external to the ODF system).
origin address field (OAF)
In SNA, a field in a format identification 0 (or format identification 1) transmission header that contains the network address of the originating location. In a format identification 2 heading, the field is called origin address field prime (OAF'). See also destination address field, format identification field, local session identification.
Original Equipment Manufacturer's Information (OEMI)
A reference to an older IBM standard for a computer peripheral interface, which defines the IBM S/360 and S/370 Channel to Control Unit interface. This interface uses ESA/390 logical protocols over a common bus that configures attached units in a multi-drop bus topology.
origin application schedule number (OASN)
An IMS recovery element in an external subsystem (for example, DB2). The OASN is equivalent to the unit-of-recovery ID in the CICS recovery token. It is coupled with the IMS ID to become the recovery token for LUWs in external subsystems.
The primary agent in a parallel group that receives data from other execution units (referred to as parallel tasks) that are executing portions of the query in parallel. See also parallel task.
A string of data representing the address of the originator of the message. The contents and format of the string are not defined by the mail server framework. The address type associated with the originator address is assumed to define the contents of the originator address field.
origin-destination assignor indicator (ODAI)
A bit in a FID2 transmission header that is used to divide the address space so that an address space manager (ASM) in one node may use all possible combinations of OAF', DAF' with the ODAI having one setting and the ASM in the adjacent node may use all possible combinations of OAF', DAF' with the ODAI having the complementary setting.
origin subarea field (OSAF)
In SNA, a field in a FID4 transmission header that contains a subarea address which, combined with the element address in the origin element field (OEF), gives the complete network address of the originating network addressable unit (NAU).
See originator/recipient name.
- A heading or the first line of a paragraph or column of text that stands alone at the bottom of a page. See also widow.
- A member of a hierarchy or auto-level hierarchy for which no explicit parent exists. Foster parents can be automatically provided for such orphans.
Data that is recorded between the last safe backup for a recovery system and the time when the application system experiences a disaster. This data is lost either when the application system becomes available for use or when the recovery system is used in place of the application system.
A contact that exists in the health notification contact list but is not defined in the contact list that is stored on the system that is specified by the CONTACT_HOST configuration parameter of the DB2 administration server. See also contact.
orphaned stub file
A file for which no migrated file can be found on the server that the client node is contacting for space management services. For example, a stub file can be orphaned when the client system-options file is modified to contact a server that is different than the one to which the file was migrated.
An orphan lock is an RLS lock that is held by VSAM RLS but unknown to any CICS region. An RLS lock becomes an orphan lock if it is acquired from VSAM by a CICS region that fails before it can log it. A VSAM interface enables CICS, during an emergency restart, to detect the existence of these locks and release them.
See object registration service.
A representation in which the lines of a projection are parallel. Orthographic projections lack perspective foreshortening and its accompanying sense of depth realism. Because they are simple to draw, orthographic projections are often used by draftsmen. See also perspective projection.
See operating system.
The IBM operating system that includes and integrates functions previously provided by many IBM software products (including the MVS operating system) for the IBM S/390 family of enterprise servers.
See Operating System/400.
See Open Systems Adapter.
See origin subarea field.
See overflow sequential access method.
See order-ship-bill system.
See operating system commanding.
See Open Software Foundation.
OSGi Service Platform
A specification that delivers an open, common architecture for service providers, developers, software vendors, gateway operators, and equipment vendors to develop, deploy, and manage services in a coordinated way.
See open systems interconnection.
See open systems interconnection architecture.
OSI directory standard
The standard, known as X.500, that defines a comprehensive directory service, including an information model, a namespace, a functional model, and an authentication framework. X.500 also defines the Directory Access Protocol (DAP) used by clients to access the directory. The Lightweight Directory Access Protocol (LDAP) removes some of the burden of X.500 access from directory clients, making the directory available to a wider variety of machines and applications.
- The facility to control, coordinate, and monitor the resources that allow communications to take place in the OSI environment.
- The set of standards that are produced by ISO/IEC/CCITT for managing OSI.
See open systems interconnection network.
See open systems interconnection reference model.
See OAM Storage Management Component.
See output sequence number.
See Open Shortest Path First.
See Object Storage and Retrieval.
See operator station task.
See Open Source Vulnerability Database.
See Operating System/Virtual Storage.
See OSA-Express for zBX.
See overtime tier.
See one-time charge.
See cross-domain resource.
See Open Transaction Manager Access.
OTMA super member
A function of IMS Open Transaction Manager Access (OTMA) that manages asynchronous IMS output for a group of clients that support the OTMA hold queue, such as IMS Connect. The OTMA super member function allows any client that is a member of the group to retrieve the asynchronous output of the other client members of the group.
See one-time password.
See organizational unit.
- A failure of a system, or planned down time for maintenance or upgrade.
- A service condition that is below a defined threshold of acceptable performance.
A technique for reducing the amount of line traffic between a host processor and an attached subsystem. The reduction is achieved by sending only variable data across the network. This data is combined with constant data by a program within the subsystem. The formatted data can then be displayed.
- Pertaining to a shipment where the shipper manages the delivery of freight from the origin to the destination.
- In communication, pertaining to data that is sent to the network. See also inbound.
outbound DTE attribute
In OSI, an attributes defined by the local node to regulate communications with an adjacent node over an X.25 subnetwork. The attribute affects only the communications over the subnetwork between the local and adjacent nodes; it does not regulate end-to-end communications.
A feed that can be created to communicate to the service providers about invoices that are processed for payment. The outbound feed helps to share the invoice details for which a service provider can receive payment.
An interaction between a marketer and a customer that is initiated by the marketer. See also touchpoint.
A mapping process in which the system translates an application file format to EDI standard formats, so that documents can be sent to the partners. To translate outbound data, an import map and a system import map in the Gentran Server for Windows Application Integration subsystem are required.
outbound pool point
A pool point where the shipper sends multiple shipments to the same facility. The orders are unloaded and delivered as new shipments to their final destination. The pool point distributor manages the delivery from the pool point to the final destination (the dray leg). See also pool point.
The mechanism through which an outbound service communicates with the externally hosted web service. Messages pass between the outbound service and the external service through the appropriate port.
The total process of controlling and managing the outgoing materials from receipt of customer order, to consolidating picking tasks, to picking, packing, and finally shipment to the customer.
The process by which a calling client application uses the adapter to update or retrieve data in an enterprise information system (EIS). The adapter uses operations such as create, update, delete, and retrieve to process the request.
Pertains to outbound shipment containers into a single location. Once a shipment container is sorted at a particular location, the system suggests the same location to sort other containers of the shipment until the user manually overrides the location.
outbound two-way push pull exchange profile
An exchange profile configured to send two requests from the owner organization to the trading partner organization, a push request and a pull request. The exchange is not synchronous and the does not wait for the business application to complete the message processing.
outbound two-way synchronous exchange
An exchange from the owner organization to a trading partner organization, in which the owner organization waits for a response from the trading partner organization.
See system output definition.
- A join whose result consists of the matched rows of the two tables that were joined and the unmatched rows of one or both tables. See also full outer join, inner join, join, left outer join, right outer join.
- A join method in which a column that is not common to all of the tables being joined becomes part of the resultant table.
outgoing change set
A change set in a repository workspace that flows to a stream or to another repository workspace. An outgoing change set is present in a workspace, but not in a workspace flow target.
A record for which one or more fields have values that differ greatly from the mean. The most common criterion is that any case with a value greater than three standard deviations from the mean (in either direction) is considered an outlier.
- The structure that defines all elements of a database within the DB2 OLAP Server. For example, an outline contains definitions of dimensions, members, and formulas.
- The component of a contract template that determines the set of clauses, their sequence, and paragraph styles. See also content pane.
- Fonts whose graphic character shapes are defined by mathematical equations rather than by raster patterns. See also raster font.
- Fonts created in the format described in Adobe Type 1 Font Format, a publication available from Adobe Systems, Inc. Synonymous with Type 1 fonts.
- Pertaining to signals that are carried within the telephony signaling channel, as opposed to the voice channel. See also in-band.
- Pertaining to user-specific data that has meaning only for connection-oriented (stream) sockets. The server generally receives stream data in the same order that it was sent. OOB data is received independent of its position in the stream (independent of the order in which it was sent).
For a data set, a situation in which its allocated space is not large enough to contain more data. For a direct access storage device (DASD) or tape volume, the out-of-space condition describes the situation in which a data set on the volume cannot be extended or another data set cannot be created.
- An exit point through which an element can notify downstream elements that they can now start.
- Pertaining to a device, process, or channel involved in an output process, or to the associated data or states.
- The result of processing data. Output can be displayed, printed, stored, or passed to another process.
In the Map Designer, a card that contains the complete definition of an output for the map including information such as target identification, destination specifics and the behavior that should occur during processing.
Data resulting from computer processing. See also input data.
Output Delivery System (ODS)
A method of controlling the destination for output within SAS. ODS can route SAS output to a SAS data file, a text listing file, HTML files, and files optimized for high-resolution printing.
In document processing, a machine-readable collection of lines of text or images that have been formatted or otherwise processed. An output document can be printed, or it can be filed for future processing.
A field specified in a display file, database file, printer file, or ICF file that is reserved for the information processed by a program. See also input field.
- In COBOL, a file that is opened in either the output mode or extend mode.
- A database or device file that is opened with the option to allow records to be written.
- A file that contains the results of processing.
In RPG, an indicator used to define the conditions under which an output record or an output field in the output specifications is written. An output indicator must be previously defined before it is used in the output specifications.
A field specified in a database, display, or ICF file that can be used for both the information supplied to the program and the information received from the program during processing.
- An open mode in which records can be written to a file.
- In COBOL, the state of a file after running an OPEN statement, with the OUTPUT or EXTEND phrase specified for that file, and before running a CLOSE statement, without the REEL or UNIT phrase specified for that file.
- A mechanism that can direct sequence information about ordered products to a printer or a file.
- An object that contains a list of spooled files to be written to an output device, such as a printer or a diskette. The system-recognized identifier for the object type is *OUTQ.
A record that represents UPDATE, INSERT, or DELETE SQL statements, and contains database output fields. Output record fields represent the columns Sterling B2B Integrator is updating or inserting and the key to the affected row or rows. Output records can be created on both the input and output sides of a map and cannot be referenced by standard rules or links.
A screen that a user navigates to based on data entry and keystrokes in a 3270 application. In the 3270 terminal service recorder, the access route from one screen to another can be recorded and saved in a dialog file.
- A service that sends data to external systems.
- A function that handles output from jobs. When a job's data sets are passed to the output service, each data set is placed on the output queue to be processed.
- In RJE, data received from the host system to the attached devices (for example, control characters, data files, and messages). See also input stream.
- Messages and other output data that an operating system or a processing program displays on output devices.
See output device.
See output service.
The unintentional modeling of chance variations in data, leading to models that do not work well when applied to other data sets. Bagging and cross-validation are two methods for detecting or preventing overfitting. See also bagging, cross-validation.
- In a register, the loss of one or more of the leftmost whole-number digits because the result of an operation exceeded the size of the register.
- The condition that occurs when data cannot fit in the designated field.
- A condition that occurs when a portion of the result of an operation exceeds the capacity of the intended unit of storage. See also exponent-overflow exception, fixed-point overflow exception.
In an HDAM or PHDAM database, the area in which IMS stores data when the root addressable area does not have enough space for a segment. See also root addressable area.
- A condition that occurs when the overflow line on a page has been printed or passed.
- A condition that occurs when a portion of an operation's result exceeds the capacity of the intended unit of storage.
In RPG, an indicator that signals when the overflow line on a page has been printed or passed. The indicator (OV and OA through OF) can be used to specify which lines are to be printed on the next page.
overflow sequential access method (OSAM)
An IMS data management access method that combines selected characteristics of basic sequential access method (BSAM) and basic direct access method (BDAM) for handling data overflow from indexed sequential access method (ISAM).
overflow storage group
A storage management subsystem (SMS) storage group used to satisfy allocations for which there is no space in the primary storage group. The overflow storage group is also known as a spill storage group.
A coupling facility list structure that contains shared queues when the primary structure reaches a user-specified overflow threshold. The overflow structure is optional. See also primary structure.
To perform an operation at the same time that another operation is being performed; for example, to perform input/output operations while instructions are being executed by the processing unit.
Fields in the same display or printer record that occupy the same positions on the display or page. Option indicators can be used to select which of the overlapping fields is to be displayed or printed.
- A resource object that can contain text, image, graphics, and bar code data. Overlays define their own environment and are often used as electronic forms.
- A program segment that is loaded into main storage and replaces all or part of a previously loaded program segment.
- To write over (and therefore destroy) an existing file.
- In Performance Tools, a graph that is placed on top of another graph so that a user can view both graphs at the same time.
- A collection of predefined data, such as lines, shading, text, boxes, or logos, that can be merged with variable data on a page or form while printing.
- The technique of repeatedly using the same areas of internal storage during different stages of a program. Unions are used to accomplish this in C and C++.
- In the M-Video Capture Adapter, the replacement of specified pixels of one source with pixels from another source such as memory pixels overlaid on live images.
- To repeatedly use the same areas of internal storage during different states of a program.
In an overlay structure, a contiguous area of virtual storage into which segments can be loaded independently of paths in other regions. Only one path within an overlay region can be in virtual storage at any given time.
The smallest unit of an overlay program that can be separately loaded by the overlay supervisor. An overlay segment consists of one or more sections and is always loaded at the same offset relative to the start of the program module.
In architecture, an operating state that allows overlay data to be downloaded to a product. For example, a printer enters overlay state from home state when the printer receives an IPDS Begin Overlay command.
In object-oriented programming, the capability of an operator or method to have different meanings depending on the context. For example, in C++, a user can redefine functions and most standard operators when the functions and operators are used with class types. The method name or operator remains the same, but the method parameters differ in type, number, or both. This difference is collectively called the function's or the operator's signature and each signature requires a separate implementation.
In architecture, a mixing rule in which the intersection of part of a new presentation space Pnew with an existing presentation space Pexisting keeps the color attribute of Pnew. This is also referred to as "opaque" mixing. See also blend, underpaint.
A way to address current limitations of best-effort networks by allowing for more bandwidth than expected network peak requirements. Overprovisioning increases the probability, but does not guarantee the quality, of the transmission of time-sensitive and bandwidth-intensive applications.
- An object that defines how to change the processing of data as specified in classifications or standardization rules.
- An execution setting that overrides default source and target settings of a map.
- In object-oriented programming, to define a new class behavior by changing a method inherited from a parent class.
- To specify attributes at run time that change the attributes specified in the file description or in the program.
- To replace a parameter or value.
- A parameter or value that replaces a previous parameter or value.
- The attributes specified at run time that change the attributes specified in the file description or in the program.
A rule that is defined by a business user to determine action in response to a violation of a validation. Override rules can be configured to allow a transaction, disallow a transaction, or allow a transaction with approval.
- A situation where a planned event takes longer to complete than was planned. For example, an overrun occurs when a rail locomotive was planned to be in the maintenance yard for 5 days but it actually takes 6 days.
- The loss of data because a receiving device is unable to accept data at the rate it is transmitted.
A situation in which more than one agent is scanning the same file system. See also underscanning.
- To merge two or more graphic characters in the same position on a form.
- To generate special characters by typing one character and then, without moving the print head to the next character position, typing the second character on top of the first.
- Pertaining to a character or symbol that occupies the same space as another character or symbol.
- In PTOCA, the presentation of a designated character as a string of characters in a specified text field. The intended effect is to make the resulting presentation appear as though the text field, whether filled with characters or blanks, has been marked out with the overstriking character.
- To place a character in a space occupied by another character.
The ratio of the sum of the traffic that is on the initiator network-device connections to the traffic that is on the most heavily loaded inter-switch links (ISLs), where more than one ISL is connected in parallel between these switches. The concept of oversubscription assumes a symmetrical network and a specific workload that is applied equally from all initiators and sent equally to all targets. See also symmetrical network.
See Open Virtualization Format.
See Web Ontology Language.
The storage space on a set of volumes to which DFSMShsm allocates migrated data sets and backup versions, but which should not be allocated for user jobs. Included in this set are migration-level-1, migration-level-2, and backup volumes.
- The user or group that creates a profile, or is named the owner of a profile. The owner can modify, list, or delete the profile.
- The user who has the highest level of access authority to a data object or action, as defined by the object or action; usually the creator of the object.
- The user name associated with a file. The owner and the superuser control access to the file. The owner is usually the creator of the file.
- One who has access and permission to operate on an entity.
owner center (OC)
A traffic data center, such as a TMC, that provides TMDD information developed or stored within it to another center. The owner center can also have direct control of field devices. In the context of the most common dialogs used by this standard, the owner center publishes information or provides responses to a request from an external center.
- A particular field in an IBM-standard, ANSI-standard, or ISO-standard volume label.
- An identifier that represents the application owner.
A business or organization that installed the Multi-Enterprise Integration Gateway software. All document exchanges are done from the owner organization to a partner organization or from a partner organization to the owner organization.
The process by which owners are inherited down the hierarchy tree, and their owner propagate attribute is set to true. If set to false, the owner becomes an override, pertaining only to this particular object.