This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See Protocol 1.
See Protocol 2.
See Platform for Privacy Preferences.
P3P compact policy
See platform as a service.
See process anchor block.
See private automatic branch exchange.
In SNA, a technique by which the receiving system controls the rate of transmission of the sending system to prevent overrun. See also flow control.
See pacing window.
In SNA, an indicator that signifies the readiness of a receiving component to accept another pacing group. The indicator is carried in a response header (RH) for session-level pacing and in a transmission header (TH) for virtual route pacing. See also response header.
- The requests that can be transmitted on the normal flow in one direction on a session before a session-level pacing response is received, indicating that the receiver is ready to accept the next group of requests.
- The path information units (PIUs) that can be transmitted on a virtual route before a virtual-route pacing response is received, indicating that the virtual route receiver is ready to receive more PIUs on the route.
- To store data in a compact form in such a way that the original form can be recovered.
- A component (SPACK or VPACK) that fits in the 9295 Multiple Digital Trunk Processor, or one of four XPACKs on the DTXA.
- To collect picked items into shipping cartons for transportation to the customer.
- A collection of components that extends existing capabilities.
- Any element in project work breakdown structure (WBS) that consists of lower-level elements, for example a deliverable or summary task with all its tasks.
- To assemble components into modules and modules into enterprise applications.
- A function that allows an application programmer to collect all the parts of an application together for distribution.
- A set of tasks that a person is allowed to perform.
- A subset of a project that is created to make metadata available to users. Different packages can be created so different user groups can create the reports they need.
- A file that contains a collection of object instances, which typically define the configuration of a web service. Generally, a package is created with a backup or export utility.
- A product or component that is specifically designed for installation by IBM Installation Manager.
- A combination of a product and rate plan that is offered by service providers for wireless devices and services.
- An installable unit of a software product. Software product packages are separately installable units that can operate independently from other packages of that software product.
- A control-structure database object produced during program preparation that can contain both executable forms of static SQL statements or XQuery expressions and placement holders for executable forms of dynamic SQL statements.
- A subset of a model, which can be the whole model, to be made available to the Cognos server. See also metric package.
- A collection of related classes and interfaces that provides access protection and namespace management.
- The wrapper around the document content that defines the format used to transmit a document over the Internet, for example, RNIF, AS1, and AS2.
- A container that organizes artifacts into groups.
- In Java programming, a group of types. Packages are declared with the package keyword. (Sun)
- A file that is comprised of projects, case data, or both that is created by one operator in Interviewer for transfer to another operator so that they can import it into their copy of Interviewer.
- A collection of attributes, notifications, operations, or behaviors that are treated as a single module in the specification of a managed object class. Packages can be mandatory or conditional when referenced in a definition of a managed object class.
- A shipping unit that may be tracked by a shipping carrier.
- In PL/SQL programming, a collection of database objects that is defined by using a CREATE PACKAGE statement and represented as a module. See also module.
- A collection of catalog entries that has a SKU and may be ordered as a single item. See also bundle, stock keeping unit.
- In Ada language, a type of program unit that groups logically related entities, such as types, objects of those types, and subprograms with parameters of those types.
A cache that stores package, statement, and section information required for the execution of dynamic and static SQL statements. This cache improves overall system performance by reducing invocations of the SQL compiler and the need to access the system catalogs. See also statement cache.
- See integrated package.
- A group of one or more packages that are designed to work together and can be installed to one directory.
The name of an object that is created by the BIND, PRECOMPILE, or REBIND command. The object is a bound version of a database request module (DBRM). The name consists of a location name, a collection ID, a package ID, and a version ID.
Statistical details about a profiled application that are grouped by package. See also instance statistics.
A record that describes the organization of the message, including its header or envelope, which contains metadata identifying the messages, and its body or payload, which contains the business content of the message. A packaging record includes details about protocol-specific security, as well as envelope fields like a MIME content type or an XML namespace.
A function of IBM Installation Manager that licensed administrators use to create customized, installable packages of other IBM applications for use by other licensed users in the administrator's organization.
pack and hold (PH)
A strategy that attempts to level load picking/packing workload by picking/packing orders early. The items are prepared for shipment and held in a staging area up to the customer order ship dates, at which time they may be shipped.
packed decimal format
Representation of a decimal value in which each byte within a field represents two numeric digits except the far right byte, which contains one digit in bits 0 through 3 and the sign in bits 4 through 7. For all other bytes, bits 0 through 3 represent one digit; bits 4 through 7 represent one digit. See also zoned decimal format.
- In data communication, a sequence of binary digits, including data and control signals, that are transmitted and switched as a composite whole. See also frame.
- The field structure and format defined in the CCITT X.25 Recommendation.
- A unit of data transmitted over a network. Large chunks of information are broken up into packets before they are sent across the Internet.
- In X.25 communications, equipment used for connecting asynchronous (start/stop) devices to an X.25 network.
- A functional unit that enables data terminal equipment (DTE) not equipped for packet switching to use a packet-switched network.
- A part of X.25 communications that defines the protocol for building logical connections between two DTEs and for moving data on these connections. See also data link level, physical level.
- The packet format and control procedures for exchange of packets containing control information and user data between data terminal equipment (DTE) and data circuit-terminating equipment (DCE).
packet level interface
In packet mode operation, the level of the interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) associated with the exchange of data and signals contained in packets.
packet major node
In VTAM, a set of minor nodes representing resources, such as switched virtual circuits and permanent virtual circuits, attached through an X.25 port. See also major node.
packet mode operation
See packet switching.
- An interconnecting set of switching nodes that enables subscribers to exchange data using standard protocol and packet-switching technology. This type of network carries messages divided into packets over circuits that are shared by many network users.
- A communications network that uses packets to send data.
packet-switched data transmission service
A user service that transmits and, if necessary, assembles and disassembles data in the form of packets. See also circuit-switched data transmission service.
The act of sending and routing packets of data from source to destination based on information contained in their header record. See also cellular digital packet data, circuit, circuit switching, X.25.
- An interconnecting set of switching nodes that enables subscribers to exchange data using standard protocol and packet-switching technology. This type of network carries messages divided into packets over circuits that are shared by many network users.
- A communications network that uses packets to send data.
- The maximum number of consecutive data packets that are allowed to flow between a data terminal equipment (DTE) and a data circuit-terminating equipment (DCE) before an acknowledgment is received for a given logical channel.
- A specified number of packets that can be sent by the DTE before it receives an acknowledgment from the receiving station.
In AIXwindows and Enhanced X-Windows, the grouping of child objects within a parent container object. If the child objects are closely packed, the common distance between their borders is minimal; if they are loosely packed, the common distance border-to-border is maximized.
A printed document containing a list of all the products in a given release. Typically, this document also contains the ship-to address, shipping carrier information, and sometimes pricing information. See also release.
See packet assembler/disassembler.
- A device used to introduce transmission loss into a circuit. It can be inserted to introduce loss or match impedances.
- To fill unused positions in a field with dummy data, usually zeros or blanks.
A character used to fill empty space. For example, in a database application, a field that is ten characters in length that has the word "file" in it contains four text characters and six pad characters
See Payment Application Data Security Standard.
See process access group.
- In DB2 for IBM i, a block of storage within a table or an index.
- In DB2 for Linux, UNIX, and Windows and DB2 for z/OS, a unit of storage within a table space, an index space, or virtual memory. In a table space, a page can contain one or more rows of a table. In an LOB table space, an LOB value can span more than one page, but no more than one LOB value is stored on a page.
- In Informix, the physical unit of disk storage and basic unit of memory storage that the database server uses to read from and write to a database. Page size is fixed for a particular operating system and platform.
- A defined unit of space on a storage medium or within a database volume.
- A unit of storage equal to 512 bytes in complex instruction set computer (CISC) systems, and 4096 bytes in reduced instruction set computer (RISC) systems. A page can be moved between auxiliary storage and main storage.
- The information that can be displayed at one time on the screen of a display device or in a window.
- A fixed-length block of instructions, data, or both instructions and data that can be transferred between active physical memory and external page storage.
- In a graphical interface, a predefined display image that typically provides fields and controls that help users accomplish tasks.
- In the graphical data display manager (GDDM) function, the picture or chart. All specified graphics are added to the current page. An output statement always sends the current page to the device.
- To move information up or down on the display.
- A node in a portal that can contain content in addition to labels and other pages. Pages can contain child nodes, column containers, row containers, and portlets.
- In a portal environment, the interface element that contains one or more portlets.
- Part of an AFP document that is enclosed by a pair of Begin Page and End Page structured fields.
- To transfer instructions, data, or both between active physical memory and external page storage.
pageable link pack area (PLPA)
An area of virtual storage containing supervisor call (SVC) routines, access methods, and other read-only system and user programs that can be shared among users of the system. See also extended pageable link pack area, modified link pack area, pageable region.
In MVS, a subdivision of the pageable dynamic area that is allocated to a job step or a system task that can be paged during execution. See also pageable link pack area.
See page printer.
The hierarchy of categories that groups website pages. The lowest-level category is defined in the page view tag. Parent level categories are defined by administrators using the category definition file (CDF).
A facility available under full-function BMS. The terminal operator invokes a transaction that communicates with the terminal in the normal way. This invoked transaction might, in turn, build pages that are (if the SEND PAGE command in the invoked transaction specified RETAIN or RELEASE) chained to the pages built by the original transaction. The operator can then retrieve pages for either transaction, for example, for comparison.
An Advanced Function Presentation (AFP) resource that defines the rules for transforming line data and XML data into Mixed Object Document Content Architecture-Presentation (MO:DCA-P) data and text controls.
A device that prints a formatted page that has graphics and text merged. See also line device.
A dimension that is not one of the two dimensions of the view being displayed, but for which a member has been selected to define the specific view requested for display. All page dimensions must have a specific member chosen in order to define the appropriate view for display.
To move to the information below the information currently shown on the display. See also page up.
See data map.
- A 512-byte block of main storage on a 512-byte boundary.
- In real storage, a storage location having the size of a page.
- A 4096-contiguous-byte portion of real memory that is used to hold a virtual-memory page.
In architecture, a named group of sequential pages. A page group is delimited by a Begin Named Page Group structured field and an End Named Page Group structured field. A page group can contain nested page groups. All pages in the page group inherit the attributes and processing characteristics that are assigned to the page group.
In AFP Utilities, a printout format of a page in the printout format definition (PFD). By using the print format utility, the user can design the page layout by placing and repeating a predefined record layout with constant data.
Page Layout tool
A Management Center feature that is used to manage layouts for store pages. A layout can be assigned to a page, such as the home page or a category page, and scheduled for a specific time period.
An assembly property that specifies the location to forward a request, but automatically tailors that location, depending on the Multipurpose Internet Mail Extensions (MIME) type of the servlet.
- See page definition.
- A metadata structure that is used to locate column values within a storage object.
The mode of operation in which a page printer can accept an entire page of data at a time from a host processor to be printed on an all-points-addressable (APA) output medium. A page can consist of text, images, overlays, and page segments. See also compatibility mode.
See logical page origin.
An electronic overlay that can be invoked for printing and positioned at any point on the page by an Invoke Page Overlay structured field in the print data. See also medium overlay.
The perforation that defines the page of a form. The perforation may or may not be at a fold in the form. A form may have several pages between each fold. See also fold perforation.
The area in the shared memory segment from which buffers are allocated for data that is read from or written to disk. Page pool size is one of the file manager startup configuration parameters.
- A device that prints one page at a time.
- In AFP support, any of a class of printers that accepts composed pages, constructed of composed text and images, among other things. See also line printer.
Page Printer Formatting Aid
An IBM licensed program with which to create and store form definitions and page definitions, which are resource objects used for print-job management. These stored objects are used to format printed output.
Page Printer Formatting Aid/370
An IBM licensed program with which to create and store form definitions and page definitions, which are resource objects used for print-job management. These stored objects are used to format printed output.
Page Printer Formatting Aid/6000 (PPFA)
An IBM licensed program with which to create and store form definitions and page definitions, which are resource objects used for print-job management. These stored objects are used to format printed output.
An AFP resource object containing text, image, graphics, or bar code data that can be positioned on any addressable point on a page or an electronic overlay. See also segment.
In architecture, an operating state that makes page-segment data available to a product. For example, a printer enters page-segment state from home state when it receives an IPDS Begin Page Segment command.
- A table space or index space that consists of a collection of VSAM data sets. See also table space.
- In Report Studio, a set of one or more designed pages which repeat in the report output for each instance of a chosen query item. See also set.
- A VSAM data set used when WebSphere MQ for z/OS moves data (for example, queues and messages) from buffers in main storage to permanent backing storage (DASD).
pages per side
See multiple up.
To move to the information above the information currently shown on the display. See also page down.
- Retrieval of a large number of records from the database, one page at a time.
- The process of adjusting text to fit within page margins.
- The process of transferring instructions, data, or pages between real storage and external page storage.
- A technique in which blocks of data, or pages, are moved back and forth between main storage and auxiliary storage. Paging is the implementation of the virtual storage concept.
- A data storage method that makes use of spare disk space by increasing the available memory.
In capacity planning, a number that indicates the amount of paging performed by a transaction in a workload. The higher the number, the more page faults generated. This number is not the number of page faults, but a representation of the total amount of paging.
In capacity planning, a value used to determine the effects of pool size changes. The greater the paging exponent, the greater the change to synchronous reads (page faults) as memory size changes.
- Disk storage for information that is resident in virtual memory but is not currently being accessed.
- Area of nonvolatile storage used to hold portions of the shared memory partition's logical memory that are not resident in the shared memory pool.
In Business Graphics Utility and the GDDM function, data that is specified so that every X value has only one Y value associated with it. See also nonpaired data.
- The location for building customized components and parenting them with other components. Subsequently, components can be reused by copying and moving them to other interfaces.
- A range of graphically displayed choices, such as colors or collections of tools, that can be selected in an application.
A distributed print system developed by MIT's Project Athena with participation from Digital Equipment Corporation (DEC), International Business Machines (IBM), and Hewlett-Packard (HP). It is a reference implementation for the OSI Document Printing Application (DPA) standard (ISO/IEC 10175).
A manually controlled MHE (material handling equipment) used to move pallets along the floor. Pallet jacks can lift a pallet only a few inches off the floor in contrast to a forklift that may lift a pallet overhead.
See primary account number.
Panel Definition Markup Language (PDML)
A tag language that defines a language for describing user interface elements and layouts. PDML is based on the Extensible Markup Language (XML). PDML files are used with the Graphical Toolbox components within the IBM Toolbox for Java licensed program to simplify the construction of user interfaces within Java.
- The action of progressively translating an entire display image to give the visual impression of lateral movement of the image.
- In computer graphics, the viewing of an image that is too large to fit on a single screen by moving from one part of the image to another.
A condition in which forms have not fed properly during printing and have become wedged in the paper path (feeding or printing mechanism), thus preventing the correct forward movement of the forms.
The left corner of the edge of a form that is fed through a printer. See also media origin.
See forms path.
In the IBM 3800 Printing Subsystem, the position of the sheet-length perforations relative to reference points on the input ramp and the fuser station. The relationship between printed output and the preprinted form of a forms overlay image.
See pen and paper interviewing.
See participant adapter parameter list.
In the Procedure Division of a COBOL program, a name followed by a period and a space and by zero, one, or more sentences. In the Identification and Environment Divisions, a header followed by zero, one, or more statements.
Pertaining to concurrent or simultaneous operation of two or more devices or to concurrent performance of two or more activities in a single device. See also serial.
parallel access volume (PAV)
In ESS, a function that enables z/OS systems to make multiple concurrent accesses to a single volume from a single host. See also I/O Priority Queuing, multiple allegiance.
An activity that is being executed at the same time as another, within the same process instance. During the time that the two activities are both running, they are said to be executing in parallel.
A channel having a System/360 and System/370 channel-to-control-unit I/O interface that uses bus-and-tag cables as a transmission medium. See also ESCON channel.
parallel database query (PDQ)
SQL queries made in parallel rather than sequential order. The tasks that a query requires are distributed across several processors. This type of distribution enhances database performance.
The component of the InfoSphere Information Server engine that runs parallel jobs. See also node.
In the context of MVS multitasking and the C Multitasking Facility, those portions of a program that can run independently of the main task program and each other. Subtasks run the parallel functions.
- The process of reading from or writing to two or more I/O devices at the same time to reduce response time.
- A form of I/O processing in which DB2 for z/OS initiates multiple concurrent requests for a single user query and performs I/O processing concurrently (in parallel) on multiple data partitions.
- The ability to perform multiple database operations at the same time.
- The state of a computer program in which parts of the program can be concurrently executed.
- A job that is run as multiple concurrent steps. A top-level job is submitted to the job scheduler and after submission is divided into subordinate jobs that run at the same time.
- A job that is compiled and run on the parallel engine and that supports parallel processing system features, including data pipelining, partitioning, and distributed execution. See also job.
parallel processing platform
A parallel-processing platform is a set of independent computers that operate in parallel and communicate over a high-speed network, bus, or interconnect. See also symmetric multiprocessing system.
- In SNA, two or more concurrently active sessions between the same two logical units. Each session can have different session parameters.
- A single intersystem link that can carry multiple independent sessions. Parallel sessions are supported by CICS intersystem communication (ISC).
- Two or more concurrently active sessions between the same two network addressable units using different pairs of network addresses or local-form session identifiers. Each session can have independent session parameters.
In the context of MVS multitasking and the Fortran Multitasking Facility, those portions of a program that can run independently of the main task program and each other. The parallel subroutines run in MVS subtasks.
- A set of z/OS systems that communicate and cooperate with each other through multisystem hardware components and software services to process customer workloads.
- A sysplex that uses one or more coupling facilities.
The execution unit that is dynamically created to process a query in parallel. A parallel task is implemented by a z/OS service request block. See also originating task.
The application of transformation rules for creating a physical application from a logical application in order to enable data parallelism in a streams processing application. See also logical application, physical application.
- A value or reference passed to a function, command, or program that serves as input or controls actions. The value is supplied by a user or by another program or process. See also configuration file, input parameter, job stream, keyword, operand, routine signature.
- In UML modeling, a specific argument that passes information between behavioral features of models, such as operations.
- Information about rate policy, rate units, currencies, contractor classification, rate types, and markup components.
- An entity that enables job instance-specific values to be substituted in job and job stream scripts, either from values in the database or at run time. Parameters cannot be used when scripting extended agent jobs.
The description of a value that a function receives. A parameter declaration determines the storage class and the data type of the value. See also argument declaration.
A cursor with a result set defined by a set of user-specified parameters and a query that references the parameters. When the cursor is opened, the parameter values and the query are used to generate the cursor result set. See also cursor.
A query with conditions in which one or more parameters are defined. The parameter values are set by the user. See also condition.
See data-driven stub.
A list of values that provide a means of associating addressability of data defined in a called program with data in the calling program. It contains parameter names and the order in which they are to be associated in the calling and called program.
parameter manager domain
Major component of CICS providing a facility to inform CICS domains of system parameters during CICS initialization. These parameters are specified in the system initialization table (SIT), as temporary override parameters read from the SYSIN data stream or specified interactively at the system console. It also provides an operator correction facility for incorrectly specified system initialization parameter keywords early in CICS initialization.
An interface map that is one level deeper than operation mappings because it maps the parameters in the source operation to the parameters in the target operation. There are five types of parameter mappings: move, map, extract, Java, and assign.
In the statement string of a dynamic SQL statement, a placeholder that represents a value that will be provided by the application program. The value of a parameter marker is provided on the EXECUTE or OPEN statement associated with the dynamic SQL statement. A parameter marker can be used where a host variable might be used if the statement string were a static SQL statement. A parameter marker is either a question mark (?) or a colon followed by a name (:name). See also host variable, typed parameter marker, untyped parameter marker.
In NetDA/2, the set of restrictions that affect only the output of a network design. A change in a parameter value does not change the input to the network design. See also constraint.
- In AIXwindows and Enhanced X-Windows, a graphical object that controls one or more smaller graphical objects attached to it. The smaller graphical objects are called children, and they are automatically deleted when their parent is deleted.
- Pertaining to a secured resource, either a file or library, whose user list is shared with one or more files or libraries.
- In a hierarchy or auto-level hierarchy, a member that has one or more child members at the level immediately below.
- A process that has spawned a child process using the fork primitive. See also child, child.
- In Ada language, the associated specification of a package body or subprogram body. The parent of a subunit is the body in which it was declared.
- An activity that starts another activity, its child.
- An activity whose processing results in the launching of a child activity. For example, a procedure becomes a parent activity as it opens a cursor, which becomes the child activity. See also child activity.
A category that contains other categories in a hierarchy. See also child category.
A schema that has a single table per dimension with each row in the table representing a member from the dimension, together with its parent. The table may or may not have a column that identifies the level of each member. A variant of this schema uses one table for all dimensions and has an additional column to identify the dimension. See also metadata schema.
A class from which another class inherits instance methods, attributes, and instance variables. See also abstract class.
The directory one level above the current directory. An object's parent directory is the directory that contains the names and controlling information for the object. If the object is named in more than one directory, it has multiple parent directories.
A list of columns in the parent table that relate to corresponding columns in the child table. See also child expression.
The file in a constraint relationship that contains the parent or primary key. See also dependent file.
- A primary key or unique key that is used in a referential constraint. The values of a parent key determine the valid values of the foreign key in the constraint.
- A field or set of fields in a database file that must be unique, ascending, and may or may not contain null values. The parent key may be the same as the primary or unique key.
For explicit hierarchical locking, a lock that is held on a resource that might have child locks that are lower in the hierarchy. A parent lock is usually the table space lock or the partition intent lock. See also child lock.
The node that contains the current node. See also child node.
For subscriptions or recurring orders a parent order contains one or more child orders. For example, a parent order is the subscription to the magazine itself, while the child order is one of the monthly issues. See also child order.
- A process that contains a subprocess.
- A process that is created to carry out a request or set of requests. The parent process, in turn, can create child processes to process requests for the parent.
parent process ID (PPID)
An attribute of a new process identifying the parent of the process. The parent process ID of a process is the process ID of its creator for the lifetime of the creator. After the creator's lifetime has ended, the parent process ID is the process ID of an implementation-dependent system process.
parent resource group
A resource group on which a child resource group depends for certain application services. A child resource group is acquired on any node in the cluster only after the parent resource group has been activated. See also child resource group, dependent resource groups.
A row that has at least one dependent row. See also dependent row.
In the software knowledge base, the product that contains a version, or the version that contains a release, or the release that contains a variation. See also software hierarchy, software knowledge base, variation, version.
parent table space
A table space that contains a parent table. A table space containing a dependent of that table is a dependent table space. See also dependent.
The state of being either even-numbered or odd-numbered. See also parity bit.
A binary digit added to a group of binary digits to make the sum of all the digits either always odd (odd parity) or always even (even parity). See also parity.
A transmission error that occurs when the received data does not have the parity expected by the receiving system. This error is usually caused by the sending and receiving systems having different parity settings.
parity update footprint
A nonvolatile entry that indicates whether the RAID parity is out of synchronization with its associated data, for example, while performing a write operation to the RAID array.
- To analyze data according to a set of rules in order to understand and validate the content and structure of that data, the elements that it is composed of, and the relationships among those elements.
- To process an SQL statement to return the result set of columns as written in the SQL statement. See also prepare.
- To break down a string of information, such as a command or file, into its constituent parts.
- A module used to break down a document into its component parts and to construct a document from its component parts.
- A program that interprets user input and determines what to do with the input.
- A program that interprets documents that are added to the enterprise search data store. The parser extracts information from the documents and prepares them for indexing, search, and retrieval.
In enterprise search, a service that feeds the parser service with documents. There is one parser driver for each collection. A collection’s parser driver service corresponds to the collection's parser in the enterprise search administration console.
A process that analyzes a sentence or phrase by dividing the strings into tokens before trying to determine the meaning of the strings. See also lexical analysis, semantics, token, tokenization.
- In VisualAge RPG, a self-contained software object consisting of a set of external features that allow the part to interact with other parts. The parts on the VRPG palette can be used a templates to create controls.
- See object.
partial-file recall mode
A recall mode that causes the hierarchical storage management (HSM) function to read just a portion of a migrated file from storage, as requested by the application accessing the file.
partially bound binding handle
In DCE Remote Procedure Call (RPC), a server binding handle that contains an incomplete server address lacking an endpoint. See also endpoint map service.
partially meshed network
A network in which some, but not all, routing and switching points are directly connected to every other routing or switching point. See also fully meshed network.
A partial set of information about queue managers in a cluster. A partial repository is maintained by all cluster queue managers that do not host a full repository. See also full repository.
- An entity other than the commit initiator that takes part in the commit process.
- An individual who has an interest in the project but does not perform an active role, for example, a sponsor or a stakeholder.
- In Enterprise Replication, the data (database, table, and columns) to replicate and the database servers to which the data replicates.
- A member of a portal place who can visit and use the place. By default, all portal users are participants in public places. See also place designer, place manager.
- An application that either initiates a transaction or receives a request on behalf of a transaction.
- A user or group assigned to process work at one or more steps in a workflow.
- An entity that is outside a given business process. In Sterling B2B Integrator, a participant is recognized only when it is used in an operation activity.
- A person who has the capability to participate in, or attend, a meeting or event.
- An organization that is involved in a supply chain that facilitates commerce. Each participant is considered an organization with a defined role.
- A business entity (such as a company, company division, or a customer) or a business role (such as a buyer or a seller) that controls or is responsible for a business process.
In Fibre Channel technology, a mode in which a loop port (L_port) in a loop has a valid arbitrated loop physical address (AL_PA) and can arbitrate, send frames, and retransmit received transmissions. See also loop port, nonparticipating mode.
- Part of a display used as the viewport, its associated window, and its display data buffer when in partitioned state.
- A logical division of storage on a fixed disk. See also subcapacity, virtualization.
- The division of a single calculated result into sub-results. Partitions are used to define how the results of the calculation will be displayed. For example, if the partitioning is by payee ID, the calculation results will show the calculated amount for each payee.
- In VSE, a division of the virtual address area that is available for program execution.
- A set of operator invocations that are fused together into a processing element. See also fuse, operator invocation.
- In a window, a logical set of tuples based on an expression. See also window.
- A group of cells in a decision table that are in the same condition column and have a common cell immediately to the left.
- A subset of a HALDB that has the capacity of a non-HALDB database and that can be administered independently.
- A subset of the active cluster nodes that result from a network failure. Members of a partition maintain connectivity with each other.
- See database partition.
- To divide a data set into separate subsets or samples for the training, testing, and validation stages of model building.
- In basic N_UP printing, the division of the medium presentation space into a specified number of equal-sized areas in a manner determined by the current physical medium.
- A subset of the data grid that is hosted across multiple shard containers.
- In BMS, an addressable subset of a display device's internal resources, consisting of a fixed part of the device's screen, and a fixed part of its internal storage. See also presentation space, viewport.
- In FD:OCA, a conceptual subdivision of a string of data fields. A partition can be further divided into subpartitions. See also partitioning.
- On a personal computer hard disk, one of four possible storage areas of variable size; one may be accessed by DOS and each of the others may be assigned to another operating system.
- A portion of a page set. Each partition corresponds to a single, independently extendable data set. Partitions can be extended to a maximum size of 1, 2, or 4 gigabytes, depending on the number of partitions in the partitioned page set. All partitions of a given page set have the same maximum size.
- To divide a type into subtypes that are mutually exclusive.
- A replicated part of a home database that contains modules that can be edited or viewed in any Rational DOORS database and then returned to the home database.
- A named fragment of a table or index.
partition-by-growth table space
A table space whose size can grow to accommodate data growth. DB2 for z/OS manages partition-by-growth table spaces by automatically adding new data sets when the database needs more space to satisfy an insert operation. See also range-partitioned table space, universal table space.
A join where all of the rows that are joined are in the same database partition. See also collocated join.
A specification of the modules to be included in a partition file. It defines the access that is allowed to each module in the partition, and the access that is allowed to the attributes and views in each of those modules.
partition descriptor block (PDB)
A collection of partition descriptor entries representing a partition set. An intermediate text block (ITB) for the PDB is created by the MFS Language Utility. This PDB ITB is used in creating a part of the device output format (DOF).
An unformatted dump of the entire CICS partition. It is produced by CICS from within the partition without operating system assistance. See also dump.
A cluster that is experiencing node isolation. See also node isolation.
The allocation of partitioned data sets (PDSs), partitioned data sets extended (PDSEs), UNIX file directories, or any combination of these such that the basic partitioned access method (BPAM) retrieves them as a single data set. See also data set concatenation.
partitioned data set (PDS)
A data set on direct access storage that is divided into partitions, called members, each of which can contain a program, part of a program, or data. See also sequential data set.
partitioned data set extended (PDSE)
A data set that contains an indexed directory and members that are similar to the directory and members of partitioned data sets (PDSs). See also library.
partitioned emulation programming (PEP)
A function of a network control program that enables a communication controller to operate some telecommunication lines in network control mode while simultaneously operating others in emulation mode.
partitioned emulation programming extension (PEP extension)
A function of a network control program that enables a communication controller to operate some telecommunication lines in network control mode while simultaneously operating others in emulation mode.
A single computer configured to run an unlimited number of instances of the Domino server program. Using partitioned servers reduces hardware expenses and minimizes server administration.
- Dividing the resources in a tape library (tape drives and tape volumes) among multiple systems, sysplexes, or both, for their exclusive use. Each partition can be viewed as a logical library with each logical library (TCDBplex) represented by one tape configuration database (TCDB).
- The process of forming multiple physical partitions from one processor complex.
- A technique whereby infrequently used columns can be stored in separate, but linked, tables.
- In FD:OCA, a conceptual division of a string of data fields into substrings. Each substring is called a partition. See also partition.
- See fragmentation.
- In AFP architecture, a method used to place parts of a control into two or more segments or structured fields. Partitioning can cause difficulties for a receiver if one of the segments or structured fields is not received or is received out of order.
- The process of distributing a file across the nodes in a node group using a hash algorithm.
- The logical division of a hard disk that is created to have separate hard disk drives for file management, multiple users, or other purposes.
See distribution key.
See distribution map.
- All of the partitions which are defined in the partition descriptor block.
- In BMS, a group of partitions designed to share the same screen. CICS must load the whole partition set onto a terminal before it can communicate with any of the partitions.
- An organization with which shippers or carriers can share available capacity.
- An organization that supplies products to sponsors. See also community.
- See trading partner.
- In distributed processing, any one of the separate communicating parts of an application. In CICS intercommunication, a transaction communicating with a remote transaction or system. A CICS program using the SAA communications interface requires a local PARTNER resource definition for its remote partner.
- In data communications, the remote application program or the remote computer.
In WebSphere Commerce, a designation for business partners that assigns them a set of entitlements and privileges. For example, a manufacturer can assign resellers a designation of Gold, Silver, or Bronze, based on their success in selling the product line, or their volume of sales.
See partner logical unit.
For logical unit (LU) 6.2, a three-flow exchange between two LUs with each LU using an LU-LU password and the Data Encryption Standard (DES) algorithm. The three-flow exchange is the LU-LU verification.
partner queue manager
See remote queue manager.
In Metro Mirror or Global Mirror operations, the relationship between two clustered systems. In a clustered-system partnership, one system is defined as the local system and the other system as the remote system.
See partner transaction program.
partner transaction program (partner TP)
The transaction program engaged in an APPC conversation with a local transaction program. See also local transaction program.
parts distribution center (PDC)
A location or warehouse from which items used in manufacturing of products are promoted, sold, and shipped or delivered to individual customers, usually in a specified region or area.
In VisualAge RPG, a collection of views and models used in building additional parts for an application. Application programmers can add parts to the palette for use in defining applications or other parts.
- A legal, functional, or physical entity that is involved, at any point, in a supply chain.
- In telephony, an addressable end point of a telephone call.
See program automatic storage area.
- One cycle of processing a body of data.
- The status of a test when the actual results match the expected result.
- A test is deemed to pass if its actual result matches its expected result. (ISTQB)
pass by reference
In programming languages, one of the basic argument passing semantics where the address of the object is passed. Any changes made by the callee to the argument value will be reflected in the calling routine at the time the change is made.
pass by value
In programming languages, one of the basic argument-passing semantics in which the value of the object is passed. Any changes made by the callee to the argument value will not be reflected in the calling routine.
In enterprise beans, the process of transferring an enterprise bean from memory to auxiliary storage. (Sun) See also activation.
A record of all conversations between a visitor's web browser and the web application through the recording of all traffic to and from the web server or servers hosting the application.
A gateway that does not exchange routing information. Its routing information is contained indefinitely in the routing tables and is included in any routing information that is transmitted. See also active gateway.
In TCP/IP, the state of a connection that is prepared to provide a service on demand. See also active open.
Session-based information, stored and encrypted in Content Manager memory, regarding authenticated users. A passport is created the first time a user accesses Cognos 8, and it is retained until a session ends, either when the user logs off or after a specified period of inactivity.
See display station pass-through.
- The mode through which VM display station users interactively access a VM system, including the one to which the terminal is attached.
- A mode through which SQL statements can be submitted directly to a data source.
In RACF secured sign-on, a dynamically generated, random, one-time-use, password substitute that a workstation or other client can use to sign on to the host rather than sending a RACF password across the network.
In computer and network security, a specific string of characters used by a program, computer operator, or user to access the system and the information stored within it. See also authentication, compound password, simple password.
See basic authentication.
Password Authentication Protocol (PAP)
A type of authentication where the user name and password are transmitted in an unencrypted form. This is a more basic form of authentication than Challenge Handshake Authentication Protocol (CHAP). See also Challenge Handshake Authentication Protocol.
password complexity policy
A policy that specifies the minimum and maximum length of the password, the minimum number of numeric and alphabetic characters, and whether to allow mixed uppercase and lowercase characters.
password phrase envelope
A policy that governs frequency of password change and password strength. See also application policy.
- The process of requiring a user to enter a password to log in to a system.
- The use of system definition macros and security maintenance utility control statements to restrict the use of IMS resources (databases, application programs, physical and logical terminals, transactions, and commands) to a person or persons who can supply the correct password.
An process that, when specified, automatically updates associated user IDs in a peer user ID association when a password is changed. See also automatic password direction.
- A parametric bicubic surface.
- A piece of code added to vendor software in order to fix a problem, as an immediate solution that is provided to users between two releases. Typically, patches can be downloaded over the Internet from vendors websites.
A length of cable with data connectors at both ends; it is normally used to interconnect two sections of building cable at a distribution panel or to connect a product to the building cable.
- In SNA, the set of data links, data link control layers, and path control layers that a path information unit travels through when sent from the transmission control layer of one half-session to the transmission control layer of another half-session.
- In VTAM, the intervening nodes and lines connected a terminal and an application program in the host processor.
- An object that defines a one-to-one relationship between a source and a destination. Using the path, the source accesses the destination. Data can flow from the source to the destination, and back. An example of a source is a data mover (such as a network-attached storage [NAS] file server), and an example of a destination is a tape drive.
- The part of the URL which points to the location of an Internet resource.
- In DL/I, the chain of segments within a record that leads to the currently-retrieved segment. The formal path contains only one segment occurrence from each level, from the root down to the segment for which the path exists.
- In VSAM, a named logical entity that is composed of one or more clusters and provides access to the records of a base cluster either directly or through an alternate index.
- In the NetView/PC program, a complete line in a configuration that contains all of the resources in the service point command service (SPCS) query link configuration request list.
- The route through a file system to a specific file. See also explicit route, route extension, virtual route.
- A route that the flow can take through the activities in a process. There may be several alternative paths.
- In a network environment, the route between any two nodes.
- In OSI, a description of how a local line or line set can be used for outbound communications.
- The series of transport network components (path control and data link control) that are traversed by the information exchanged between two network accessible units.
- A route on a chart between two entities. A path may include intermediate entities.
path control network
See transport network.
- A collection of equivalent paths. Storage devices may have one - n path groups.
- In ESA/390 architecture, a set of channel paths that are defined to a control unit as being associated with a single logical partition (LPAR). The channel paths are in a group state and are online with the host. See also logical partition.
path group identifier
The ESA/390 term for the identifier that uniquely identifies a given logical partition (LPAR). The path-group identifier is used in communication between the LPAR program and a device. It associates the path-group identifier with one or more channel paths, thereby defining these paths to the control unit as being associated with the same LPAR.
- In z/OS Communications Server, data sent by the host according to the definition of the VPACING parameter that determines how many messages can be sent in a session to the z/OS Communications Server application by another SNA logical unit without requiring that an acknowledgment be sent.
- In SNA, the smallest amount of data that the system sends out on a communications line, consisting of a transmission header followed by a basic information unit or a basic information unit segment.
- The name of an object in the integrated file system. Protected objects have one or more path names.
- A name that specifies all directories leading to a file plus the file name itself.
In OSI, a set of paths grouped by the similarity of their requirements. OSI Communications Subsystem requires that each line be assigned to a line set. If the line is to be used for outbound communications, then its associated line set must be assigned to a path set. A line that is not assigned to a path set (through a line set) can be used only for inbound communications.
An attack technique that alters a document or resource location requested in a URL and forces access to files, directories, and commands that reside outside the web document root directory.
path traversal attack
An attack that uses special character sequences to exploit a URL and gain access to restricted files, directories, and commands that are located in the web document root directory or the CGI root directory.
A cross-segment healthcare model in which the patient assumes an accountability and responsibility for their own health records and health education. The model focuses on preventive health, and reduces costs across the system through improved efficiency.
- A model of physical or virtual assets that is used as a template for a solution. A pattern specifies components, links, and policies that follow architecture and design best practices and is used for repeatable deployment of applications, databases, and other resources. A pattern is deployed as a single virtual environment that includes hardware and the workloads that run on it and all related components, links, and policies. See also virtual application pattern, virtual system pattern.
- A method of describing text to be identified, using one or more regular expressions.
- A sequence of characters used either with regular expression notation or for path name expansion, as a means of selecting various characters strings or path names, respectively. The syntaxes of the two patterns are similar, but not identical.
- The sequence of class labels assigned to the values in a data record which can be used to identify a subset of records that might be standardized the same way. See also class, condition, standardization rule, value.
- A reusable solution that encapsulates a tested approach to solving a common architecture, design, or deployment task in a particular context. See also micropattern.
- A process that is used to group data into manageable pieces.
- In REXX, the parts of a parsing template that allow a string to be split by literal pattern or positional pattern. Parentheses may be supplied to create a variable pattern.
The language that defines standardization rules. See also standardization rule.
See wildcard character.
In GOCA, an attribute used to access a symbol set or coded font. See also symbol set.
- In printers, storage that contains the fonts and images used for printing the character data, overlays, and segments contained in the page buffer.
- In PSF, an area of storage that holds the raster patterns for fonts and images.
Groups of regular expressions that are composed of special pattern-matching characters. Pattern strings can be used in addresses to specify lines and, in some subcommands, portions of a line.
The mode of operation in which all host commands that require movement of cartridges are queued until the library is returned to automated mode. Paused mode allows the operator to enter the enclosure area while the robot is not operating to correct a problem, add cartridges to the bulk input station, or remove cartridges from the bulk output station.
See parallel access volume.
- The tongue of a ratchet.
- A pivoted tongue or sliding bolt adapted to fall into notches on a machine to permit motion in only one direction.
- The organization that is being paid for delivering a shipment. Typically, the payee is the carrier but it could also be a third-party logistics provider.
- An individual who is being compensated or is approving the compensation results.
- In a RosettaNet business message, the service content plus any file attachments. The payload is packaged together with the headers to form a complete RosettaNet Business Message.
- The body of a message that holds content.
- Application data contained in an IP flow, excluding header and administrative information.
- User content that is stored from a data transfer. Data includes overhead and user information.
In WebSphere Commerce Payments, a merchant's request of a financial institution to approve all or part of an order. In many cases, all the money authorized for collection by an order will be collected in a single payment. Some payment systems allow the money authorized in one order (that is, one set of payment instructions) to be collected in multiple payments, depending on the business model.
In WebSphere Commerce, a financial operation that is associated with a payment instruction. For example, approve (authorize), reverse approval, deposit (capture), reverse deposit, refund, and validate are payment actions.
payment action rule
See payment rule.
Payment Application Data Security Standard (PA-DSS)
A program that helps software vendors and others develop secure payment applications that do not store prohibited data, ensuring that their payment applications support compliance with the PCI DSS.
Payment Card Industry Data Security Standard (PCI DSS)
A worldwide information security standard assembled by the Payment Card Industry Security Standards Council (PCI SSC). The standard was created to help organizations that process card payments to prevent credit card fraud through increased controls around data and its exposure to compromise. The standard applies to all organizations which hold, process, or pass cardholder information from any card branded with the logo of one of the card brands.
In WebSphere Commerce, the instance of a payment method with the details necessary to perform payment actions. For example, if a payment method name is CardBrandX, then the payment instruction consists of CardBrandX, plus the cardholder name, billing address, account number, and expiration date.
Payment Plug-in Controller
In WebSphere Commerce, the software layer that coordinates and delegates payment requests to the payment plug-ins. The Payment Plug-in Controller interacts with WebSphere Commerce Payments through the WCPayments plug-in.
In WebSphere Commerce, the conventions that govern the exchange of data between payment cassettes or plug-ins and the backend financial systems (payment service provider or payment processor). For example, VisaNet and Paymentech have different payment protocols.
In e-commerce, the electronic equivalent of a cash register that organizes and accepts payment for the goods and services selected for purchase. A payment server uses other components, such as a payment gateway and a payment management system, to complete the financial transactions.
See protected buffer pool.
See private branch exchange.
See purchasing card.
A proprietary transfer protocol of Tivoli Provisioning Manager for OS Deployment that delivers non-identical sets of files to several target computers using multicast. Contrast with MCAST and unicast. See also MCAST.
A data structure in an application program in which IMS puts the status of the application program's DL/I calls. See also status code.
See power control compartment.
PC double-byte encoding scheme
See IBM PC double-byte encoding scheme.
See physical channel ID.
A device that connects one or more subordinate PCI buses to a primary PCI bus. The PCI bus that is closest to the system processor is the primary PCI bus, and the subordinate buses are secondary PCI buses.
See procedure correlation identifier.
See Payment Card Industry Data Security Standard.
See PCI Express.
PCI Express (PCIe)
A local serial interface that provides a high-speed data path between the processor and attached devices. Unlike previous PCI implementations that used a parallel bus architecture, PCI Express uses point-to-point serial links called lanes. See also Peripheral Component Interconnect.
See Peripheral Component Interconnect-X.
A file format that is an adaptation of the Integration Exchange Format (IXF), which was specifically designed to enable the exchange of relational database structures and data. The PC/IXF file architecture maintains the independence of both the exporting and the importing database systems.
See printer control language.
See Program Call Markup Language.
See personal-computer NFS daemon.
See program control program.
See peak cell rate.
See Perl-compatible regular expression.
See print contrast signal.
PC single-byte encoding scheme
See IBM PC single-byte encoding scheme.
See program control table.
See picture exchange file.
See partition descriptor.
See personal digital assistant.
See partition descriptor block.
See physical device.
The IPDS to PDF Transform function of IBM Infoprint Server for iSeries. One or more PDF files are generated from an Intelligent Printer Data Stream (IPDS), Advanced Function Presentation (AFP), or SNA character string (SCS) spooled file and then sent as email, spooled for printing, or stored in the integrated file system as a stream file. A mapping program can be used to implement intelligent routing of the PDF subsystem output. See also intelligent routing, mapping object, mapping program.
See primary delay interval.
See PSB directory.
See Programming Development Manager.
See Panel Definition Markup Language.
See public data network.
See policy decision point.
See parallel database query.
A measure of priority that determines the amount of resources that a database server allocates to process a query in parallel. These resources include memory, threads (such as scan threads), and sort space.
See partitioned data set.
See partitioned data set extended.
PDT architect lead
Responsible for defining the project architecture, ensuring its integration with other systems and ensuring compliance with the e-business Architecture Blueprint and BT-CIO standards and guidelines.
See presentation data value.
A layout where complex groups of linked entities are arranged to show the structure of associations. It is most suitable for charts with many linked entities. See also layout.
peak cell rate (PCR)
The maximum rate at which an asynchronous transfer mode (ATM) endsystem can transmit cells into the network over the user-to-network interface (UNI). See also maximum burst size, sustainable cell rate.
The maximal memory used to process an OPL problem. See also local memory.
- The maximum rate encountered over a given period of time.
- The maximum speed at which a device could operate under ideal conditions, if its designer were choosing the workload.
See processing engine archive.
- A general term for the corresponding node or entity with which one communicates.
- In network architecture, any functional unit that is in the same layer as another functional unit.
- A type of cluster domain that consists of two or more peer cluster domain nodes organized in such a way as to have one online (master) node, and one or more online or offline (standby) nodes. In a failover scenario, the peer domain cluster redistributes the workload from the failed master node to a standby node, to increase the availability. See also cluster domain node.
- A set of nodes configured for high availability. Such a domain has no distinguished or master node. All nodes are aware of all other nodes, and administrative commands can be issued from any node in the domain. All nodes also have a consistent view of the domain membership. See also management domain.
A requirement that is at the same hierarchical level as another requirement. Two requirements are peer requirements when they are children of the same parent. All requirements at the root level are peer requirements of one another.
In the IBM Realtime Interface Co-Processor device-driver application programming interface (API), the bus master services that are available through the IBM Realtime Interface Co-Processor Portmaster Adapter/A. These services transfer device-driver functions, such as the PeerClose function, between application programs running on the base operating system and application programs running on the IBM Realtime Interface Co-Processor adapter.
In high availability disaster recovery, the state during which log pages are shipped from the in-memory log write buffer of the primary database to the standby database. See also asynchronous mode, near synchronous mode, remote catchup pending state, super asynchronous mode.
In a RACF data sharing group, any system to which RACF propagates a command entered by the system operator or administrator. See also coordinator system.
Peer-to-Peer Remote Copy (PPRC)
A remote-copy service that provides a synchronous copy of a volume or disk for disaster recovery, device migration, and workload migration. See also PPRC Extended Distance, remote copy, synchronous PPRC.
A replication configuration between logical tables in which updates to any table are replicated to the other tables and convergence is maintained. Peer-to-peer replication can involve two or more servers. See also multitier replication, update-anywhere replication.
Peer-to-Peer Virtual Tape Server (PtP VTS)
A virtual tape server (VTS) configuration in which copies of data in newly created or updated tape volumes are automatically created or updated in each of two interconnected VTSs. This dual-volume copy functionality improves data availability and data recovery, while being transparent to user applications and host processor resources.
Peer-to-Peer VTS data (PtP DATA)
A function that allows an installation or application to obtain operational mode settings and device-related information from the Peer-to-Peer Virtual Tape Server (PtP VTS) library.
See picture element.
A state between online and offline in which an object is making a transition from online to offline or from offline to online. The pend state is initiated when a pend event is sent by an online object or when an add event is sent by an offline object. See also un-pend.
- The initial state of a defined volume pair before it becomes a duplex pair. During this state, the contents of the primary volume are copied to the secondary volume.
- Pertaining to a submitted request that is awaiting processing.
pending active session
In VTAM, the state of an LU-LU session recorded by the system services control point (SSCP) when it finds both logical units (LUs) available and has sent a CINIT request to the primary logical unit (PLU) of the requested session. See also active.
pending application description
An application description that is incomplete and not ready for use in planning or scheduling. See also active application description.
The dummy occurrence created by the daily planning process to honor a dependency that has been resolved in the long-term plan, but cannot be resolved in the current plan because the input arrival time of the predecessor is not within the current plan end time.
pending tag number
A tag number for a newly created requirement in a document. See also requirement tag.
The collaboration feature that provides access to people from various contexts. People awareness lets you see references to people and contact people by name through the Sametime online status indicator. Throughout the portal, wherever you see the name of a person, you can view the online status of the person, send email, initiate a chat, or share an application via an electronic meeting. See also person link.
- See policy enforcement point.
- See partitioned emulation programming.
- See program entry procedure.
- See program error program.
See partitioned emulation programming extension.
A pricing scheme whereby the price of a product is based on a percentage of the price of another line (base contract line). Percentage-based pricing is often used with maintenance agreements.
The extent of completion of a specific project activity, expressed as a percentage of the estimated total effort of duration for the activity, and entered by a team member or project manager, according to their judgment.
A linear series of unconnected cuts in continuous-forms paper. The interval between cuts is a tie. The perforation defines either a fold or page boundary. Continuous-forms, fan-folded paper is always folded on the perforations.
- A measure of a system's ability to perform its functions, including response time, throughput, and number of transactions per second.
- The measurement of a Watson system in terms of accuracy, precision, and recall in answering questions or discovering relationships.
A description of an objective or commitment of performance. It consists of a performance class name, boundary definitions, response time definition, response time ranges, and response time percentage objectives. Sessions can be assigned performance classes.
performance class data
Detailed transaction-level monitoring data, which includes task identification information, resource request counts, CPU and dispatch times, and time spent waiting for I/O. Monitoring of performance (that is, the collection of performance class data) is activated by the MNPER system initialization parameter. See also monitoring record.
Information about the operation of a system or a network of systems that can be used to understand response times and throughputs and to predict the effects of certain system operational changes or programming changes.
See temporary error.
- The determination of how well a specific system is meeting or may be expected to meet specific processing requirements at specific interfaces. Performance evaluation, by determining such factors as throughput rate, turnaround time, and constrained resources, can provide important inputs and data for the performance improvement process.
- A module that evaluates the strengths and the weaknesses of the suppliers based on their past performance to create an objective and a comprehensive supplier performance report.
Performance Management Agent (PM Agent)
A function of the operating system that takes data collected by Collection Services, reduces the data, and sends that data to IBM for analysis. This was formerly called Performance Management for eServer iSeries.
Performance Management for System i5 (PM for System i5)
An IBM offering that takes customer system data and sends that data to IBM for analysis. IBM then returns capacity planning and performance analysis reports and graphs.
- A function of the operating system that observes system and device activity, and records these observations in a database file.
- A set of software tools used to track minute-by-minute statistics on clients, cubes, and servers.
performance monitor interface (PMI)
In VTAM, an interface that enables the collection of information about VTAM's performance and resource utilization, which, in turn, allows for an early diagnosis of problems and more efficient tuning and debugging of VTAM.
The established response time for transactions. See also threshold.
A description of an external and observable forwarding treatment. Routers use the per-hop behavior code points to give network traffic a certain priority. A per-hop behavior is applied to each Internet Protocol (IP) packet when differentiated services is designated. The six bits of the differentiated services code-point field designate the per-hop behavior.
- A component of a schedule that divides the timeline into named intervals, such as peak, off-peak, and no service.
- The symbol ".". The term dot is used for the same symbol when referring to a web address or file extension. This character is named <period> in the portable character set. See also dot.
- A date interval that reported values are saved in. An example of a period is December 2000.
- In a table, an interval of time that is defined by two datetime columns. A period contains a begin column and an end column. See also begin column, end column.
- A time period defined in the Tivoli Workload Scheduler for z/OS calendar.
peripheral border node
A border node that interconnects adjacent APPN networks having different network identifiers in order to support LU-LU sessions that have one partner LU in its native network. See also extended border node.
Peripheral Component Interconnect-X (PCI-X)
An enhancement to the Peripheral Component Interconnect (PCI) architecture. PCI-X enhances the Peripheral Component Interconnect (PCI) standard by doubling the throughput capability and providing additional adapter-performance options while maintaining backward compatibility with PCI adapters. See also Peripheral Component Interconnect.
peripheral host node
A node that provides an application programming interface (API) for running application programs but does not provide SSCP functions and is not aware of the network configuration. The peripheral host node does not provide subarea node services. It has boundary function provided by its adjacent subarea.
In SNA, a link that connects a peripheral node to a subarea link. See also route extension.
In SNA, a location that uses local addresses for routing and, therefore, is not affected by changes in network addresses. A peripheral node requires boundary function assistance from an adjacent subarea node.
A scripting language that was originally designed as a tool for writing programs in the UNIX environment but has evolved to include the power and flexibility of a high-level programming language such as C. Perl is an open-source language.
Perl-compatible regular expression (PCRE)
A regular expression C library that is much richer than classic regular expression libraries. See also regular expression.
A basic property of transaction processing systems whereby the modifications made to data by a committed transaction must be permanent. Subsequent transactions requesting the data modified by a previous transaction must always see the new data. These changes must be preservable even in the event of a system failure.
permanent data set
A user-named data set that is normally retained for a longer period than the duration of a job or interactive session. See also temporary data set.
permanent dynamic queue
A dynamic queue that is deleted when it is closed only if deletion is explicitly requested. Permanent dynamic queues are recovered if the queue manager fails, so they can contain persistent messages. See also temporary dynamic queue.
- An error that cannot be eliminated by retrying an operation.
- An error--for example, a hardware component failure--that can be corrected only by external intervention. See also temporary error, transient error.
In OSI, an event that indicates the occurrence of an irrecoverable error--one that makes a resource unavailable or causes OSI Communications Subsystem to stop. Permanent events are logged and generate a message to the operator. See also transient event.
permanent license key
A license key that IBM issues when clients purchase an application that requires such a key. See also trial license.
A record that has been identified as having sufficient historical or other value to warrant continued preservation by the organization beyond the time normally required for administrative, legal, or fiscal purposes.
permanent virtual channel (PVC)
In asynchronous transfer mode (ATM), a predefined connection between two users that is similar to a leased line. Call setup and disconnection are unnecessary for a PVC. See also switched virtual channel.
permanent virtual circuit (PVC)
A virtual circuit that has a logical channel permanently assigned to it at each data terminal equipment (DTE). A call establishment protocol is not required. The permanent virtual circuit establishes the identity of the called party within the network services contract.
A Sterling Control Center building block to which restricted roles can be assigned. Permissible objects have both use and visibility (private or public) aspects controlled by user roles.
- The ability to access a protected object, such as a file or directory. The number and meaning of permissions for an object are defined by the access control list.
- The authority granted to users to give them access to an application's features and functions.
- The ability to perform an action against an object. The meaning of permissions is defined by the access policy.
- The ability to perform a specific action, or access a feature or object.
- An entitlement or privilege that governs how a user interacts with the repository, specified by role, not the individual user.
- Authorization to perform activities, such as reading and writing local files, creating network connections, and loading native code. See also administrative domain.
In z/OS UNIX, part of security controls for directories and files stored in the z/OS UNIX file system. Permission bits are used to grant read, write, search (just directories), or execute (just files) access to owners, or file or directory owning groups.
A 3-digit octal code or a nine-letter alphabetic code that indicates the access permission for a UNIX file. The access permissions are read, write, and execute. See also access permission.
One of the 3-character fields within the permissions column of a UNIX directory listing. The permission field indicates the read, write, and run permissions for the file or directory owner and for the group. It is used by file systems to control access.
- A named set of permissions that are required for a certain role.
- A set of access permissions applicable to one or more access collections.
Continuous updating of inventory quantity data on every item, real-time, as each transaction that reduces or increases the inventory level is executed (as opposed to collecting all of the transactions at the end of a shift and updating the inventory data on all items once).
- A characteristic of data that is maintained across session boundaries, or of an object that continues to exist after the execution of the program or process that created it, typically in nonvolatile storage such as a database system.
- In Java EE, the protocol for transferring the state of an entity bean between its instance variables and an underlying database. (Sun)
A level that determines the degree of detail written to the database as a business process runs. Decreasing the persistence level increases the business process performance at the cost of full tracking for each step of the business process.
A data field that an object uses to write data to a database table after processing. See also nonpersistent column.
A cookie that is stored on a user’s computer until it expires or until the user deletes the cookie. Persistent cookies are used to collect identifying information about the user, such as web surfing behavior or user preferences for a specific website.
persistent data store
A nonvolatile storage for event data, such as a database system, that is maintained across session boundaries and that continues to exist after the execution of the program or process that created it.
An environment that once created by the user may be used repeatedly without incurring the overhead of initialization and termination for each call. The environment remains available until explicitly terminated by the user.
persistent LU-LU session
See persistent session.
A message that survives a restart of the queue manager. See also nonpersistent message.
persistent node IP label
An IP alias that can be assigned to a service interface on a specified node. By assigning a persistent node IP label to a node on a network, a user has a node-bound address on a cluster network that can be used to access a specific node in the cluster for administrative purposes.
See attribute alert generator.
- A session that remains active even though there is no activity on the session for a specified period of time.
- An LU-LU session that z/OS Communications Server retains after the failure of a z/OS Communications Server application program. Following the application program's recovery, the application program restores or terminates the session. See also multinode persistent session.
- A VTAM security option for conversation-level security between two logical units (LUs) that provides a way of reducing the number of password transmissions by eliminating the need to provide a user ID and password on each attach (allocate) during multiple conversations between a user and a partner LU. The user is verified during the sign-on process and remains verified until the user has been signed off the partner LU.
- An application security mechanism that maintains lists of verified user IDs and passwords so that they do not need to be resubmitted with each access request to secure resources.
An individual authenticated by the portal and having a person record in one or more corporate directories. Persons can be members of places, public groups within the organization corporate directory, or personal groups that a user defines.
The digital certificate that a client or server gives to other clients or servers as a means of authentication. A personal certificate is usually obtained from a certificate authority.
In voice mail, a greeting recorded by a subscriber. See also system greeting.
- A distribution list for calendar invitations and email that is created by a user for personal use.
- In Sametime Connect, a group of people designated by the user as a group. A user can choose individuals from the public Directory (public group) and create personal groups, which are then stored locally. Users can add and remove people from a personal group, whereas the membership of the public group is defined by the owner of the public Directory.
personal health information (PHI)
Any information in a medical record or designated record set that can be used to identify an individual and that was created, used, or disclosed in the course of providing a healthcare service such as diagnosis or treatment.
personal health record (PHR)
An electronic, universally available, lifelong resource of health information that is used by individuals to make health decisions. People own and manage their information in the PHR, which comes from healthcare providers and the individual. See also electronic health record.
- In Cryptographic Support, a unique number assigned by an organization to an individual and used as proof of identity. PINs are commonly assigned by financial institutions to their customers.
- For BlackBerry devices, a unique alphanumeric sequence that defines each BlackBerry device at the time of manufacturing. See also pin.
The process of enabling information to be targeted to specific users based on business rules and user profile information. See also customization.
In the RFQ trading mechanism, a list of attributes created by a selling organization that a buyer must use when sending an RFQ to that organization. In addition to the predefined attributes provided by the seller, buyers can specify unique attributes in designated attribute fields.
personally identifiable information (PII)
A choice that allows a user to display or change the characteristics or properties of an object. For example, a user can customize the interface by specifying how the menu bar, status area, and information area are displayed.
A reference to a person name or a group name that appears with the Sametime online status indicator. The reference lets you view the online status the person, send an email, start a chat, or share an application using an electronic meeting, among other actions shown on the person link menu. See also people awareness.
A document that contains personal information about a worker and other general information such as workflow and purchasing information. See also labor record.
- A group of views that show various aspects of the resources in the workbench.
- A set of views and features in the Eclipse IDE that offer the user to see and work with different parts of their projects.
A technique used to achieve realism when drawing primitives. In a perspective projection, the lines of projection meet at the viewpoint; thus, the size of a primitive varies inversely with its distance from the source projection. The farther a primitive or part of a primitive is from the viewer, the smaller it will be drawn. This effect, known as perspective foreshortening, is similar to the effect achieved by photography and by the human visual system. See also orthographic projection.
The process of changing a parameter value or function slightly to see whether the change eliminates numerical difficulties that may have stalled the algorithm. Changes are limited to some neighborhood of the initial values.
A generally small and often wireless device that allows users to access information on demand from many locations. Mobile pervasive devices include personal digital assistants, smartcards, digital wireless telephones, handheld computers, and digital watches. Fixed devices such as point of sale terminals, bank machines, home entertainment centers, and airport check-in terminals can also be considered pervasive devices when they can be used to deliver a range of network-based information.
A locking strategy whereby a lock is held between the time that a row is selected and the time that a searched update or delete operation is attempted on that row. See also currently committed, optimistic locking.
For processor storage, real and virtual storage, and channel volume, 2 to the 50th power or approximately a thousand terabytes. For disk storage capacity and communications volume, 1 000 000 000 000 000 bytes.
Petroleum Administration Defense District (PADD)
A standard district that is used to track fuel prices for a region of the United States. The PADD fuel prices are based on a U.S. Department of Energy index and are used to calculate fuel accessorial charges.
Petroleum Industry Data Exchange (PIDX)
A standards committee for the American Petroleum Institute that develops global energy business standards for the oil and natural gas industry and its trading partners.
See Predictive Failure Analysis.
See priority flow control.
See printout format definition.
See program function key.
See program function key.
See program fault management.
See physical file system.
See print format utility.
See presentation graphics feature.
See process group ID.
See Pragmatic General Multicast.
See Pretty Good Privacy.
See presentation graphics routines.
See pack and hold.
See phantom address.
See soft hyphen.
- A table row that can be read by application processes that are executing with any isolation level except repeatable read. When an application process issues the same query multiple times within a single unit of work, additional rows can appear between queries because of the data being inserted and committed by application processes that are running concurrently.
- A row of a table that is initially modified or inserted during a transaction but is subsequently rolled back.
- A period of time that is used to plan, schedule, and perform maintenance tasks. See also quality status.
- In PSF/VSE, the smallest complete unit that can be referred to in a library.
- A distinct part of a process in which related operations are performed.
- A distinct period of a release lifecycle during which a team completes a specific set of activities that are related to an application.
- A process that includes the Explore stage followed by the Test stage of a scan. See also multiphase scan.
phase alternation line (PAL)
The television broadcast standard for European video outside of France and the countries of the former Soviet Union. See also NTSC format.
A magnetic recording method in which each storage cell is divided into two regions that are magnetized in opposite directions; the sequence of the magnetic direction indicates whether the binary character represented is 0 or 1.
Phase I negotiation
A negotiation that establishes the protection suite for the Internet Key Exchange (IKE) messages themselves. A Phase I negotiation determines how to protect a Phase II negotiation. A Phase I negotiation is governed by key policies.
See PCI host bridge.
See partitioned HDAM.
See personal health information.
See partitioned HIDAM.
A person who engages in a type of email fraud called phishing. See also phishing.
The act of tricking a user into providing personal or financial information by falsely claiming to be a legitimate entity. See also phisher.
The act of limiting a handset to a specific service provider's network. For example, AT&T subsidizes the cost of a handset, and does not allow that handset to be used on Verizon's network. See also Global System for Mobile Communications, Subscriber Identity Module card.
A written language in which separate symbols represent vowels and consonants. Examples of phonetic languages are English, Greek, and Russian. Contrast with ideographic language. See also ideographic language.
In the IBM 3800 Printing Subsystem, an opening on the drum surface through which the photoconductor is wrapped from the supply spool inside the drum, around the drum, and back through the opening on the drum surface to the takeup spool. The gap is sealed after the photoconductor is in place.
See PHP Hypertext Preprocessor.
See personal health record.
- One or more words that together form a unit that is to be searched for in the content of a document.
- An ordered set of one or more consecutive COBOL character strings that forms part of a clause or a Procedure Division statement.
See phonetic spelling.
The embodiment of the physical arrangement of nodes in a system, the artifacts that are stored on each node, and the components and other elements that the artifacts implement. Nodes represent hardware devices such as computers, sensors, and printers, as well as other devices that support the runtime environment of a system. Communication paths and deploy relationships model the connections in the system.
In a database, a segment type that is dependent on a segment type defined at the next higher level in the database hierarchy. All segment types in a database, except the root, are physical children since each is dependent on at least the root.
- A connection that establishes an electrical circuit.
- See connection.
The task of counting all items in storage at one time to verify the accuracy of system inventory records. Physical count is usually performed once or twice a year. All warehouse operations are shut down until the process is complete.
An ordered set of physical database records. See also logical database.
physical database record
In databases, a physical set of hierarchically related segments of one or more segment types. See also database record.
- In DB2 data warehousing, a metadata model that represents the tables and other objects in a database.
- The data model that represents the design schema for the information assets by using the relational model approach. The physical data model is typically generated from the logical data model by using the same modeling tools, although it can be reverse engineered from an existing database. A physical data model can be implemented many times. The physical data model contains design tables, design stored procedures, and physical domains.
physical data resource (PDR)
See implemented data resource.
- A database file that describes how data is to be presented or received from a program and how data is actually stored in the database. A physical file contains one record format and one or more members. See also logical file.
- An indexed file containing data for which one or more alternative indexes have been created.
- A file that is stored in one or more storage pools, consisting of either a single logical file, or a group of logical files that are packaged together as an aggregate. See also aggregate, logical file, physical occupancy.
A component of a user-defined index over XML data. A physical index contains generated columns, which are keys that support the logical index, and it also contains the indexed document values. See also logical index.
- A product that is a single item and that cannot be disintegrated into components. A physical kit is considered a finished product at the time of dispatch. For example, a cellular phone with its battery and handset is a preconfigured physical kit.
- A combination of multiple components that are not individually defined as catalog items. The item availability is only verified for the parent item, and not for the child items.
- The lowest layer of network design as specified by the ISO Open System Interconnection (OSI) reference model. This layer is responsible for interfacing with the medium, detecting and generating signals on the medium, and converting and processing signals received from the medium and from the data link layer.
- The OSI layer that provides the mechanical, electrical, functional, and procedural means to start, maintain, and deactivate physical connections for transmissions between data-link entities.
In X.25, a standard that defines the electrical, physical, functional, and procedural methods used to control the physical connection between the data terminal equipment (DTE) and the data circuit-terminating equipment (DCE). See also data link level, packet level.
In relationship to a virtual tape server (VTS), a hardware enclosure consisting of one or more VTS libraries with each VTS being identified to the host as a separate library. Restrictions by the library manager may be set on an individual library basis or on a physical library basis, as is the case with import.
In NCP, the physical connection between NCP and an adjacent device or local area network (LAN). A single physical line, such as token-ring or frame-relay, can support multiple logical lines. See also logical line.
The actual hardware connection between two systems. See also logical link.
physical lock (P-lock)
A type of lock that DB2 acquires to provide consistency of data that is cached in different DB2 subsystems. Physical locks are used only in data sharing environments. See also logical lock.
The process of writing log records from the log buffers to the system log. See also logical logging.
A physical entity on which information is presented; for example, a sheet of paper, a roll of paper, microfilm, an envelope, label, or display screen. See also medium presentation space.
physical metadata layer
In the operational metadata model, a layer that contains metadata information from the data source. It also contains query subjects that represent the imported tables and relationships between them.
The amount of space that is used by physical files in a storage pool. This space includes the unused space that is created when logical files are deleted from aggregates. See also logical file, logical occupancy, physical file.
- In printing, a single surface (front or back) of a form.
- In MFS, all or part of a logical page that is defined to be entered (input) or displayed (output) at one time.
- In COBOL, a device-dependent concept defined by the action taken by a printer when a new page is requested.
- Part of a central processing complex (CPC) that operates as a CPC in its own right, with its own copy of the operating system.
- A set of hardware resources, formed by partitioning, that can support a single operating system.
- The smallest unit of disk-space allocation for a logical volume. The physical partition is contiguous space on a physical volume. A fixed-size portion of a physical volume. One or more physical partitions constitute the underlying physical storage medium for a logical partition.
A single path through the I/O interconnection fabric that attaches two units. For Copy Services, this is the path from a host adapter on one ESS (through cabling and switches) to a host adapter on another ESS.
physical printable area
In architecture, a bounded area defined on a side of a sheet within which printing can take place. The physical printable area is an attribute of sheet size and printer capabilities, and cannot be altered by the host. The physical printable area is mapped to the medium presentation space, and is used in user printable area and valid printable area calculations. See also user printable area, valid printable area.
In OSI, any resource of a computer available to do work, such as the processor, main storage, or a line. See also logical resource.
See sequential data set.
physical services header (PSH)
An X.25 protocol used by IBM Systems Network Architecture (SNA) data terminal equipment (DTE). Physical services header provides address services for physically connected systems or devices. The System i family does not support PSH. See also enhanced logical link control, Qualified Logical Link Control.
With respect to data, the actual space on a storage device that is to contain data. See also logical storage.
- The component that manages and monitors the resources (such as attached links and adjacent link stations) associated with a node, as requested by an SSCP via an SSCP-PU session. An SSCP activates a session with the physical unit in order to indirectly manage, through the PU, resources of the node such as attached links. This term applies to type 2.0, type 4, and type 5 nodes only.
- In SNA, one of three types of network addressable units (NAUs). A PU exists in each node of an SNA network to manage and monitor, at the request of a system services control point logical unit (SSCP-LU) session, the resources (such as attached links and adjacent link stations) of a node. See also control point.
physical unit type (PU type)
In SNA, the classification of a physical unit according to the type of node in which it resides. The physical unit type is the same as its node type; that is, a type 1 physical unit resides in a type 1 node, and so on.
- The portion of a single unit of storage accessible to a single read/write mechanism, for example, a drum, a disk pack, or part of a disk storage module.
- A volume that has a one-to-one association with physical tape media and is used directly by z/OS applications. Physical volumes may reside in an Automated Tape Library Dataserver (ATLDS) or be kept on shelf storage either at vault sites or within the data center where they can be mounted on stand-alone tape drives.
physical volume status
A relationship between a volume and the storage management subsystem (SMS) that indicates whether a volume is managed by SMS, whether all of its data sets have an associated storage class, and whether all of its data sets are cataloged in an integrated catalog facility (ICF) catalog. A volume can be in one of three states: fully converted, partially converted, or unconverted. See also volume status.
See program isolation.
- To retrieve an item from a location in a warehouse and set it aside to be packaged for shipping.
- In architecture, a match between the pick window and a graphics primitive during correlation.
picket fence bar code
See horizontal bar code.
A rectangular volume around the cursor that is sensitive to picking events. If a drawing primitive draws within this volume, a pick event is reported. The width and height of the region can be set by the user. If the z-buffer is enabled, the depth of the region is the entire z-buffer.
- A listing of line items to be picked to satisfy a customer order. This printable list is used to locate and select the necessary items to fulfill an order.
- A list of cell values available to a user when entering data into a cell.
- A data category that has a limited number of permissible values, which are often presented in a drop-down list in the user interface.
A defined role in WebSphere Commerce that picks products from fulfillment centers and packs the products for shipping to customers. The pick packer also manages pick tickets and packing slips which are used to confirm shipment of products during order fulfillment. See also logistics manager.
- A printed document containing a list of all the products required to fulfill the releases in a given pick batch. This document is used by pickers to gather the products that must be packaged and shipped for all of the releases included in the pick batch.
- A sheet containing the list of items that need to be pulled from inventory to fill an order.
In architecture, a region of a graphics presentation space that is used for correlation. A pick window has specified characteristics; for example, position in a graphics presentation space, size.
See Platform for Internet Content Selection.
See segment chain.
- The smallest printable or displayable unit that can be displayed. A common measurement of device resolution is picture elements per inch.
- An element of a raster pattern about which a toned area on a photoconductor can appear.
- See process identification number.
- See process ID.
- See product identifier.
- See persistent identifier.
See Printer Inventory Definition Utility.
See Petroleum Industry Data Exchange.
See program interface.
- The process of combining receipts and error messages with a user message unit or within a user message unit.
- When data is sent between two NCPs or between an NCP and a link-attached station, the process of combining a PIU and an acknowledgment for a PIU that was previously sent.
- See program integrated information.
- See Program Integrated Information.
- See personally identifiable information.
See product information management.
See personal identification number.
- Part of an electrical connection.
- To highlight or prioritize an important item in a community.
- An area of memory reserved for certain functions.
- One of the connectors in an adapter plug.
- For BlackBerry devices, to send a PIN-to-PIN message. See also personal identification number.
- To attach an object, such as a file or a bookmarklet, to a profile.
A display that consists of traffic-lighted pins placed on a background image. A pinboard is used to provide a map with pins associated with each of the regions, states, or areas in the databases.
- A job that tracks the availability of assets and that is performed by an agent. Several ping jobs can be used to monitor the availability of any computer or subset of computers in the network.
- A utility used to test a path from one host computer to another across an IP-based network.
- The command that sends an Internet Control Message Protocol (ICMP) echo-request packet to a gateway, router, or host with the expectation of receiving a reply.
Data that is held in cached storage control, due to a permanent error condition, until it can be destaged to a direct access storage device (DASD) or until it is explicitly discarded by a host command. Pinned data exists only when using fast write, dual copy, or remote copy functions.
- See program initialization parameter.
- See policy information point.
- See prepare in progress.
- See problem isolation procedure.
PIP data area
A 2000-byte data area that is associated with each prestart job. The PIP data area is used to hold program initialization parameters that are passed on the program start request to the prestart job.
- In UNIX-based operating systems, a connective symbol used between two commands on a command line, indicating that the output from the preceding command is to be used as the input for the following command.
- To direct the data so that the output from one process becomes the input to another process. The standard output of one command can be connected to the standard input of another with the pipe operator. Two commands connected in this way constitute a pipeline.
- An interprocess communication mechanism that connects an output file descriptor to an input file descriptor. Usually the standard output of one process is connected to the standard input of another, forming a pipeline.
- A one-way communication path between a sending process and a receiving process.
- In printers, the hardware path between the channel station or received-page station and the stacker.
- A graphical representation of the application version, gate, and environment status of a release.
- To start execution of an instruction sequence before the previous instruction sequence is completed to increase processing speed.
- A series of transactions and statuses that guide document types, such as Sales Order and Purchase Order, through a related process.
- A serial arrangement of processors or a serial arrangement of registers within a processor. Each processor or register performs part of a task and passes results to the next processor; several parts of different tasks can be performed at the same time.
- A component that ingests structured UMF data and performs name standardization, data quality management, address hygiene, and entity resolution. The pipeline also generates alerts, based on the system configurations. See also address hygiene, data quality management, entity resolution, name standardization, pipeline node.
- A message processing procedure that consists of one or more programs known as stages.
- A direct, one-way connection between two or more processes.
- A sequence of message handler programs and, optionally, header-processing programs, that are run to handle a web service request. See also pipeline configuration file.
- To perform processes in series.
pipeline configuration file
An XML document that specifies the configuration of either a service requester pipeline or a service provider pipeline that handles a web service request. See also pipeline.
A graphical configuration tool designed to set up conditions for which pipelines will be used in the business process workflow. For example, an organization uses pipeline determination to configure a condition that determines whether order lines contain hazardous materials, and then sends the order line down the correct pipeline.
The physical machine that contains one or more running pipeline processes. See also pipeline.
- The number of characters printed per inch.
- A unit of measurement for the width of type (or a printed character), based on the number of characters that can be set (or printed) in one linear inch; for example, 10-pitch has 10 characters per inch. Uniformly spaced fonts are measured in pitch. See also point.
See path information unit.
- A method of rearranging data in a data set to reveal patterns in the data.
- An element in the tableau representation of a linear problem that is used in an iteration of the simplex algorithm and held constant while certain other elements in the table are set to zero. This makes it possible to determine whether a variable should enter the basis.
- To treat multiple table columns as though they were a single column with multiple values. The specified table columns rotate through 90 degrees to form rows. See also rotate.
- A data array in which the various elements can be moved along the X and Y axes to produce a different aggregate view.
- A data summarization tool that can automatically sort, count, and total data stored in tables and display the summarized data. Pivot tables are useful to quickly create crosstabs to display the joint distribution of two or more variables. Typically, with a pivot table the user sets up and changes the summary's structure by dragging and dropping fields graphically.
- A table characterized by having one metric as a column dimension and all the rest of the metrics represented as row dimensions.
See picture element.
- In the X Window System, a data type to which icons, originally created as bitmaps, are converted.
- A three-dimensional array of bits. A pixel map can be thought of as a two-dimensional array of pixels, with each pixel being a value from zero to 2 to the power N -1, where N is the depth of the pixel map.
In Enhanced X-Windows, the number of bit planes used in a particular window or pixmap. For a window, a pixel value indexes a color map and derives an actual color to be displayed. A pixel is an N-bit value, where N is the number of bit planes (the depth) used in a particular window or pixmap.
See pixel map.
See public key algorithm.
See Public Key Cryptography Standards.
See public key infrastructure.
See pick location assignment.
A virtual location that is visible in the portal where individuals and groups meet to collaborate. In a portal, each user has a personal place for private work, and individuals and groups have access to a variety of shared places, which can be either public places or restricted places. See also Lotus QuickPlace place.
- A redacted version of an item that is displayed to the user in situations where displaying the full item is not possible or not permitted. See also cloaked item, signpost message.
- The symbol, consisting of a single period in a REXX parsing template, that can be replaced by a value while running a REXX program. A placeholder has the same effect as a variable name, except that no variable is set.
- An object, component or file that only exists to mark the position of an intended entity.
- A variable that is replaced with a value.
- See cleartext.
- In cryptography, any message that is not encrypted.
- The means of scheduling jobs. Objects in the database become instances in the plan. See also ad hoc job, explorer view, forecast plan, graph view, impact view.
- A feature that is offered by service providers for various telecom services.
- The packaging construct by which APIs are made available to consumers. A plan makes available a collection of resources or operations from one or more APIs, and is published to communities of application developers.
The autonomic manager component that structures the actions needed to achieve goals. See also autonomic manager.
- A bitmap, or bit plane, in a pixmap or in a window that is viewed as a stack of bitmaps.
- In FD:OCA, a two-dimensional subarray consisting of all elements that have an identical position within a given dimension of a regular three-dimensional array.
An accessorial charge that is assigned to shipments automatically. When a planned accessorial is assigned to a contract, the accessorial charge is applied to every shipment that uses the contract.
See preventive maintenance.
planned remote takeover
In an RSR environment, a remote takeover initiated by the IMS operator as part of shutting down the IMSs at the active site in order to transfer the active IMS workload to the remote site. See also remote takeover.
planned start time
The time that IBM Workload Scheduler estimates a job instance will start. This estimate is based on start times of previous instances of the job. See also actual start time, earliest start time, latest start time, scheduled time.
A time-based approved portfolio or space plan that is the planning data for implementations or forward looking metrics. An approved scenario updates the planning environment to reflect the new or updated plan.
Business transformation operations process (BTOP) phase which develops project plan, commits schedules and resources (fINAL pROJECT pRoposal, IPMT and PDT contract), and releases funds for next two phases.
The status of a shipment during the tendering process, such as unplanned, tendered, or covered. See also shipment status.
- A facility that operates as a manufacturer or supplier of products.
- A physical location where goods are manufactured.
See license plate.
- The combination of an operating system and hardware that makes up the operating environment in which a program runs.
- Any base of software technologies on which applications or services can be provided; for example, the Eclipse platform.
platform as a service (PaaS)
The delivery of a computing platform, including applications, optimized middleware, development tools, and Java and Web 2.0 runtime environments, in a cloud-based environment.
Platform for Internet Content Selection (PICS)
A specification that enables Internet users to filter the material they encounter when they surf the web. Users can accept or reject the material according to its ratings. This specification enables parents, businesses, schools, or discerning individuals to block access to inappropriate and objectionable material.
Platform for Privacy Preferences (P3P)
The World Wide Web Consortium (W3C) specification that enables websites to define their privacy practices in a standard format. For more information, see the P3P project website (http://www.w3.org/P3P/). See also P3P compact policy.
A technique in which a history of all or part of a program is recorded. The recording allows the user to regenerate the input and output in either the forward or backward direction. This technique is used in debugging.
A policy that consists of instructions to play back a recorded transaction and collect performance data. See also record and playback.
See private loop direct attach.
See product line engineering.
A cable that is listed by the Underwriters Laboratory (UL) as having adequate fire resistance and low smoke-producing characteristics for installation without conduit in ducts, plenums, and other spaces used for environmental air, as permitted by National Electrical Code Articles 725-2(b) and 800-3(d).
A Printing Systems Manager (PSM) attribute that is used for defining the capability of a printer to support different placements of output images on a medium. For example, the plex attribute could specify whether the printer is to support simplex or tumble mode.
PL/I for System i
An IBM PRPQ that is a high-level language available on the server. The PL/I for System i PRPQ is capable of handling a large variety of data structures and easily allows variation of precision in numeric computation.
See physical lock.
See port login.
See pageable link pack area.
See Procedural Language SQL.
See program list table.
See primary logical unit.
Pluggable Authentication Module (PAM)
A programming interface that enables third-party security methods to be used. PAM enables multiple types of authentication, such as Kerberos and the Rivest-Shamir-Adleman (RSA) algorithm, to be used without changing login services.
- A dynamically loadable library that a DB2 database management system uses to carry out user-written actions that involve the database.
- A stage that is used to connect to data sources but that does not support parallel processing capabilities. See also connector.
- A separately installable software module that adds function to an existing program, application, or interface.
See Performance Management Agent.
A message that indicates that a preventive maintenance work order is about to become due for an asset or location. See also preventive maintenance record.
See Print Management Facility.
PM for System i5
See Performance Management for System i5.
- See project management institute.
- See Performance Monitoring Infrastructure.
- See performance monitor interface.
See protocol-specific MPTN manager.
See Predictive Model Markup Language.
See processing mode document.
See preventive maintenance package.
See problem management record.
See preventive maintenance schedule.
See primary node.
See purchase order.
- A digital recording of a radio broadcast or similar program, made available on the Internet for downloading to a personal audio player. See also streaming.
- To publish audio files, typically in MP3 or WMA format, along with news feeds so that listeners can download them and listen to them on their computer or portable digital audio player. See also streaming.
See program operator interface.
- In GOCA, a parameter that specifies the position within the drawing order coordinate space. See also pitch.
- A unit of measurement used mainly for describing type sizes. Each pica has 12 points, and an inch has approximately 72 points. See also point size.
- The numeric value that is assigned to an attribute based on the value of the attribute and the interval in which the value is included.
- In printing, in the didot point system, a unit of 0.0147 inch. There are 12 didot points to the cicero. Before present technology (circa mid-1970s), a point was not so precise: in the Monotype system, a point was 0.0138 inches (72 points = 0.996 inches); in the Linotype system, a point was 0.014 inches (72 points = 1.008 inches).
- The second byte of a DBCS code, which uniquely identifies double-byte characters in the same ward. See also ward.
An asset whose length or measure is not integral to its maintenance, such as an airplane or a train car. See also linear asset.
The upper limit in a given interval for an attribute that is ultimately used to determine reason code assignment. Typically, this limit is used for linear and logistic models where the interaction of variables is controlled.
- The symbol shown on a display or window that a user can move with a pointing device, such as a mouse.
- A data element or variable that holds the address of a data object or a function. See also scalar.
- The action of lining up the mouse pointer so that the pointer lies on top of something.
- The action of positioning the pointing cursor on a displayed object.
The instantaneous copy that the FlashCopy service makes of the source volume. See also FlashCopy service.
In SQL replication, a type of replication target table whose content matches all or part of a source table, with an added column that identifies the approximate time when a particular row was inserted or updated at the source system.
point of consistency
A time when all of the recoverable data that a program accesses is consistent. The point of consistency occurs when updates, insertions, and deletions are either committed to a physical database or rolled back. See also commit point, roll back.
- A physical location that stores servers and routers in a network cloud.
- A system that has been identified as a contact point for another subnetwork for the purposes of collecting topology information.
point of recovery
In WebSphere MQ for z/OS, a set of backup copies of WebSphere MQ for z/OS page sets and the corresponding log data sets required to recover these page sets. These backup copies provide a potential restart point in the event of page set loss (for example, page set I/O error).
In retail communications and Point-of-Sale Utility, pertaining to a method of providing information to support sales and of collecting the resulting sales information from retail devices located in stores.
In retail communications and Point-of-Sale Utility, a device that, together with the store controller, provides retail transaction, data collection, credit authorization, price information, and other inquiry and data entry functions.
The IBM licensed program that provides connectivity between the system and retail controllers. In addition, the licensed program provides file conversion capabilities through the retail file conversion system.
The height of a font in points. See also point.
- Pertaining to a style of messaging application in which the sending application knows the destination of the message.
- Pertaining to data transmission between two locations without the use of any intermediate display station or computer.
- A Fibre Channel topology that employs direct links between each pair of communicating entities. See also switched fabric.
A communication operation that involves exactly two processes or tasks. One process initiates the communication through a send operation. The partner process issues a receive operation to accept the data being sent.
A communications line that connects a single remote station to a computer. See also multipoint line.
- An arrangement where two devices share the same transmission line at the same time. See also multipoint line, multipoint network.
- A network arrangement made up of point-to-point links.
Point-to-Point Protocol over Ethernet (PPPoE)
A network protocol used to connect one or more computers to the Internet through a shared modem. The protocol is based on the common standards PPP and Ethernet.
Point-to-Point Tunneling Protocol (PPTP)
A protocol that allows for the encapsulation of data packets for one network protocol in packets used by another protocol. As a result, TCP/IP data can be transmitted over a non-TCP/IP network, which allows for secure communications over virtual private networks.
In a queue, an incorrectly formatted message that the receiving application cannot process. The message can be repeatedly delivered to the input queue and repeatedly backed out by the application.
A technique for minimizing the time to achieve network convergence. After a connection disappears, the router advertising the connection retains the routing table entry for several update periods and specifies an infinite cost in its broadcasts.
See plain old Java object.
- A piece of configuration that controls some aspect of processing in the gateway during the handling of an API invocation. Policies are the building blocks of assembly flows and provide the means to configure capability, such as security, logging, caching, routing of requests to target services, and transformation of data from one format to another. Policies can be configured in the context of an API or in the context of a plan.
- The set of characteristics that defines the behavior of a runtime artifact. See also business glossary, information governance policy.
- See information governance rule.
- A set of rules and actions that are required to be performed when certain events or status conditions occur in an environment.
- A list of file-placement and service-class rules that define characteristics and placement of files. Several policies can be defined within the configuration, but only one policy set is active at one time. See also file-management policy, file-placement policy, file-placement rule.
- A document that sets forth high-level statements of how changes, releases, or other processes are to be managed, organized, and performed.
- In QoS, the combination of rules and services. The rules define the criteria for traffic treatment, network resource access, and use.
- In the Backup, Recovery, and Media Services licensed program, a named or otherwise identifiable set of controls used by Backup, Recovery, and Media Services to manage and control specific operations. A policy is an overriding value that is carried in tables for use as a default in processing backup, recovery, archive, and media management operations.
- A set of considerations that influence the behavior of a managed resource or a user. See also policy expression.
policy administration point (PAP)
A capability that provides enterprise service-oriented architecture (SOA) policy administration capabilities, such as policy creation, modification, storage, and distribution.
A requirement, preference, or capability of a managed resource. See also Web Services Policy Framework.
A core capability of the IBM Autonomic Computing Initiative that addresses the need to simplify the management of products and complex systems. See also Policy Management for Autonomic Computing.
policy decision point (PDP)
A capability that decides, based on environmental conditions, which predefined policies in the environment should be enforced. For example, a policy decision point might use a requester identity to determine whether to limit access to a resource.
- A grouping of policy users with one or more policy sets, which manage data or storage resources for the users. The users are client nodes that are associated with the policy domain. See also active policy set, domain.
- For System Storage Archive Manager collections, a grouping of rules for the management of security, retention, and storage.
The Policy Management for Autonomic Computing graphical user interface (GUI) that is used to create, deploy, and otherwise manage policies. The Policy Editor is implemented using the Integrated Solutions Console.
policy enforcement point (PEP)
A capability that enforces policy decisions maybe by a policy decision point. For example, a policy enforcement point would permit or deny a requester access to a resource depending on what the policy decision point determined is the correct action.
- A feature that automates the tasks that the user specifies in the policy scripting language.
- A component of Tivoli Intelligent Orchestrator that collects data and makes decisions on when to deploy servers based on defined thresholds.
policy evaluation engine
The component of a autonomic manager that selects policies, evaluates policies, and returns the decisions that are contained within policies. Because different autonomic managers can have different policy evaluation engines, more than one policy evaluation engine can exist within a policy-enabled system.
A representation of a policy. See also policy.
See policy grammar.
Policy Management for Autonomic Computing (PMAC)
The core technology of the IBM Autonomic Computing initiative that provides a standard policy definition and management infrastructure, which enables self-management capabilities and dynamic configuration of systems in an on demand environment. See also Policy-based Management.
policy privilege class
A privilege class that gives an administrator the authority to manage policy objects, register client nodes, and schedule client operations for client nodes. Authority can be restricted to certain policy domains. See also privilege class.
A group of managed resources that share one or more common policies and which model the management or organizational structure of a network computing environment. Administrators use policy regions to group similar resources, to define access to the resources, to control the resources, and to associate rules for governing the resources.
- A declarative, IF-THEN statement containing the precondition, which can consist of multiple Boolean clauses, and the decision for a policy.
- A programming statement within a policy that defines a specific action to be performed.
- A rule in a processing policy that consists of a matching rule and a processing rule.
- A collection of assertions about how services are defined, which can be used to simplify security configurations.
- A group of rules in a policy domain. The rules specify how data or storage resources are automatically managed for client nodes in the policy domain. Rules can be contained in management classes. See also active policy set, management class.
- The collection of policies within a policy group that share the same decision name. See also decision name.
In a Tivoli environment, a policy region created or residing in another policy region. When a policy subregion is created, it initially uses the resource and policy properties of the parent policy region. The Tivoli administrator can later change or customize these properties to reflect the specific needs and differences of the subregion.
The process of ensuring that each individual policy is valid. In Policy Management for Autonomic Computing, each policy is checked to ensure that it is syntactically correct and that it references only valid sensors and effectors.
- To run a polling sequence.
- A feature that allows a meeting moderator to send a question to the meeting participants. The moderator can view the results of the poll and show the results to everyone else in the meeting.
- To repeatedly request data from a server.
- In Managed System Services, to query devices to determine operational status and to collect system data.
- To determine if any remote device on a communications line is ready to send data.
- In data communications, an interrogation that determines whether a station is ready to transmit information.
- A feature that allows the meeting moderator to send a question to the meeting participants. The moderator can view the results of the poll and show the results to everyone else in the meeting.
- Interrogation of devices for such purposes as avoiding contention, determining operational status, or determining readiness to send or receive data.
- The process whereby stations are invited, one at a time, to transmit.
- The frequency at which data is collected from the device resources such as CPU and memory.
- The time between the start of each polling session for this system.
- The period that elapses between the automatic refresh of the data displayed on a map.
A list of addresses that the host system uses to control the polling of control units or devices on a BSC or SDLC multipoint line. A general polling list contains the addresses of the control units only; a specific polling list contains the addresses of the devices, which include the addresses of the control units.
In the GDDM function, a curve based on a sequence of lines. A polyfillet is a curved line that is tangent to the end points of the first and last lines and tangent to the midpoints of all other lines.
- A continuous set of lines that are created sequentially.
- In computer graphics, a sequence of adjoining lines.
- A shape that consists of only straight lines.
An object-oriented programming characteristic that allows a method to perform differently, depending on the class that implements it. Polymorphism allows a subclass to override an inherited method without affecting the method of the parent class. Polymorphism also enables a client to access two or more implementations of an object from a single interface.
- See storage pool.
- The graphical representation of a participant in a collaboration.
- A collection of communications devices.
- A division of main or auxiliary storage.
- A grouping of storage space that consists of volumes, logical unit numbers (LUNs), or addresses that share a common set of administrative characteristics.
- In DFSMSrmm, a group of shelf locations in the removable media library whose rack numbers share a common prefix. The shelf locations are logically grouped for easier access to volumes.
- A group of resources with similar characteristics and attributes.
A shipment consolidation strategy where smaller shipments destined for the same geographic region are pooled together to form a single truckload (TL) or less than truckload (LTL) shipment to a pool point. From the pool point, individual shipments are made to their respective destinations. This strategy results in reduced overall transportation costs.
pool nondatabase faults
In Performance Tools, the total number of interruptions to jobs (not necessarily assigned to this pool) that were required to transfer data into the pool to permit the machine interface instruction to access the nondatabase data.
A distribution facility that is used to efficiently route orders and shipments from their origin to their final destination. See also cross-dock facility, dray leg, inbound pool point, outbound pool point.
pool storage group
A type of storage group that contains system-managed direct access storage device (DASD) volumes. Pool storage groups allow groups of volumes to be managed as a single entity. See also storage group.
See point of presence.
- To remove an item from the top of a pushdown list. See also push.
- The removal of a module that is immediately below the stream head.
- In architecture, a method used to retrieve a value from a segment call stack.
See Post Office Protocol.
See Post Office Protocol Version 3.
See power-on reset.
- A hardware interface to which an I/O device is attached for the purpose of sending and receiving data.
- A specific communications end point within a host. A port is identified by a port number.
- The point of connection of an operator to a stream. Input ports consume one or more streams, whereas output ports produce a stream.
- In the Internet suite of protocols, a specific logical connector between the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP) and a higher level protocol or application.
- A name and number that correspond to a specific service provided by a IP based application.
- An access point for data entry or exit.
- A distinct interaction point between a class and its environment or between the behaviour of a class and its internal parts.
- An end point for communication between applications, generally referring to a logical connection. A port provides queues for sending and receiving data. Each port has a port number for identification. See also node.
- To modify a computer program that runs on a given system to enable it to run on a different system.
- An abstraction that is used by transport protocols to distinguish among multiple destinations within a host machine.
- The physical entity within a host, system, or storage system that performs the data communication (transmitting and receiving) over the Fibre Channel.
- In time-slot management, one end of a 64 kbps unidirectional stream which can be attached to the SCBus.
- As defined in a Web Services Description Language (WSDL) document, a single endpoint that is defined as a combination of a binding and a network address.
- The ability of a program to run on more than one type of computer system without modification.
- The ability of a programming language to compile successfully on different operating systems without requiring changes to the source code.
- The ability of equipment to be transported manually.
- The ability to use Virtual Storage Access Method (VSAM) data sets with different operating systems. Volumes whose data sets are cataloged in a user catalog can be removed from storage devices of one system, moved to another system, and mounted on storage devices of that system. Individual data sets can be transported between operating systems using access method services (AMS).
Portable Application Solutions Environment
A feature of the i5/OS operating system that provides the ability to run certain UNIX applications. Programs that run in i5/OS PASE have direct access to PowerPC instructions and access to i5/OS services such as file system support and sockets support.
portable data terminal (PDT)
A small system data terminal that can travel with the warehouse operator throughout the warehouse. The operator can access the system, update records, and so on, from anywhere in the warehouse without the need to continuously return to a terminal station.
Portable Document Format (PDF)
A standard specified by Adobe Systems, Incorporated, for the electronic distribution of documents. PDF files are compact; can be distributed globally via email, the web, intranets, or CD-ROM; and can be viewed with the Acrobat Reader.
portable file name character set
The set of characters from which portable file names must be constructed to be portable across implementations conforming to the ISO POSIX-1 standard and to ISO/IEC 9945.
Portable Operating System Interface (POSIX)
An IEEE family of standards designed to provide portability between operating systems that are based on UNIX. POSIX describes a wide spectrum of operating-system components ranging from C language and shell interfaces to system administration.
Portable Operating System Interface for Computer Environments
See Portable Operating System Interface.
The place where portal administrators set and maintain basic collaboration permissions, place records, place membership records, and server settings for companion products for advanced collaboration.
The specialization of a service integration bus destination. Each port destination represents a particular message format and transport protocol that you can use to pass messages to an externally-hosted service.
- A container for the tasks that apply to each role that the user is assigned. The portfolio is the primary way in which a user's work is organized in the interface.
- The complete inventory of an organization's programs and projects, or both.
A plan that contains the overall plan summary data, such as the scope of planning, data rollups, common setup data, comparison goals and targets, and acts as a means to compare and evaluate scenario alternatives.
- A logical name used to group one or more ports (network devices or interfaces) of the same network type that can be used to reach a given end-user destination. For example, if multiple ATM adapters in the IBM Content Manager VideoCharger Server complex are connected to the same ATM networks, these adapters can be configured under the same port group. The controller selects ports as necessary to balance the load.
- A group of ports identified by the common carrier with a single DTE address. The network directs incoming calls to the first available port, using a sequential search (rotary) technique.
port login (PLOGI)
The port-to-port login process by which initiators establish sessions with targets. See also fabric login.
- The part of a socket address that identifies a port within a host.
- In Internet communications, the identifier for a logical connector between an application entity and the transport service.
- Pertaining to a display or hardcopy with greater length than width.
- The arrangement of text on a page so that it is oriented for normal reading when its length is greater than its width.
- In architecture, a presentation orientation in which the Xm-axis is parallel to the short sides of a rectangular physical medium.
See portrait orientation.
portrait page presentation
The position of a printed sheet that has its short edges as the top and bottom and its long edges as the sides. See also landscape page presentation.
The position of a printed form with its short edges as the top and bottom and its long edges as the sides. See also landscape position.
- In time-slot management, a collection of ports that can be connected using a single CA_TDM_Connect() API call to a complementary collection of ports. An example of a port set is the transmit-receive pair corresponding to one telephony channel on a Digital Trunk Quad Adapter (DTQA).
- A set of ports on a remote target that are connected to the same switching fabric.
An element in a Web Services Description Language (WSDL) document that comprises a set of abstract operations, each of which refers to input and output messages that are supported by the web service. See also interface.
- Any location in a string that may be occupied by an element and that is identified by a serial number.
- Within an attribute, the ordinal position of one value relative to another.
- Within a string, the ordinal position of one element of a string relative to another.
See application file.
- A parameter that must appear in a specified location, relative to other parameters. See also keyword parameter.
- A variable within a shell program. Positional parameters are assigned from the shell's arguments when the shell is invoked
positive acknowledgment reply
In IPDS architecture, a reply to an IPDS command that has its ARQ flag on and in which no exception is reported. See also negative acknowledgment reply.
positive semidefinite matrix
A matrix that represents a problem with quadratic terms. If the quadratic term gives rise to a matrix that is positive semidefinite, CPLEX can solve the problem (all other aspects of the problem being feasible).
See Portable Operating System Interface.
POSIX open system environment (POSIX OSE)
The open system environment in which the standards included are not in conflict with ISO/IEC and consist of: International Standards and Profiles, developed by ISO, IEC, or CCITT; Regional Standards and Profiles, developed by a group recognized as an official body by a regional governmental entity, such as the European Community; and National Information Technology Standards and Profiles, developed by a national standards body recognized as such by ISO, IEC, or CCITT, as appropriate.
See POSIX open system environment.
A mechanism by which a process may be notified of, or affected by, an event occurring in the system. Examples of such events include hardware exceptions and specific actions by processes. POSIX signal is also used to refer to the event itself.
- See power-on self-test.
- In HTTP, a parameter on the METHOD attribute of the FORM tag that specifies that a browser will send form data to a server in an HTTP transaction separate from that of the associated URL.
- In the AIX operating system, the action required to make a pop-up or pull-down menu appear. This action is normally a click or a button press on one of the mouse buttons.
- To add information in a record to keep that record current.
- To note the occurrence of an event.
- Environmental and state conditions that must be fulfilled after the execution of a test or test procedure. (ISTQB) See also precondition.
- A constraint that must be true at the completion of an operation.
One or more commands specified by the system administrator that run after the cluster manager runs a particular event script. Post-events are usually site-specific scripts integrated into the system when it is installed.
An operator that is appended to the assigned value of an attribute. For example, the Screen Size attribute can have a value of 26 inches. The numeral 26 is the number attribute value, and inches is the postfix.
In Tivoli NetView, a daemon that directs network management information between multiple application programs and agents that are running concurrently. The postmaster determines the route by using specified addresses or a routing table that is configured in the object registration service.
The strategy of waiting as long as feasible before executing tasks that change standard product into a customer specific product (i.e. applying special tickets or labels). Postponing this product change reduces the risks associated from changes in customer demand or requirements.
PostScript image file
In DCF, any file containing encapsulated PostScript that is imbedded in a DCF document by means of the .PO [PostScript] control word. PostScript image files can include any combination of images or text.
Post Telephone and Telegraph Administration (PTT)
An organization, usually a government department, that provides data communication services in countries or regions other than the USA. Examples of PTTs are the Bundespost in Germany and the Nippon Telephone and Telegraph Public Corporation in Japan.
A family of IBM systems distinguished by their object-oriented architecture, integrated relational database, and high-level machine interface. Power Systems solutions support the IBM i, i5/OS, Operating System/400, AIX, and Linux operating systems. See also IBM i.
PowerHA SystemMirror configuration database
See Object Data Manager.
See Power Integrated Facility for Linux.
Power IFL processor core
A licensed processor core that is enabled by feature code ELJ1 on IBM Power Systems servers. Each Power IFL processor core feature enables one processor core. Only the Linux operating system can be run on Power IFL processor cores.
- A key sequence that restarts the operating system (or other program) without turning off the electrical power of the system.
- See initial microprogram load.
power sequence cable
A signal cable that connects the secondary racks to each other and to the primary rack in a system with more than one rack, and allow complete control of the power from the primary rack.
See power supply unit.
power system control network (PSCN)
The power subsystem of the System z servers that is controlled by a fully redundant dual-Ethernet communications network. This network provides communication to all field-replaceable units (FRUs) and hierarchical control through a mirrored system of control cards and IP addresses. The PSCN provides a means for subsystems to communicate and control the dynamic parameters of system operation. The PSCN also supports error reporting, failure data collection and recovery detection, and correction of both the internal hardware and firmware of the System z servers.
See physical partition.
See physical point of attachment.
See Page Printer Communication Component.
See Page Printer Formatting Aid/6000.
See program-to-program interface.
See parent process ID.
See pages per minute.
See Point-to-Point Protocol.
PPP filter identifier
A filter identifier that allows you to apply filter rules to an interface that has been defined in a point-to-point profile. The PPP filter identifier also links the filter rules to groups of users in a point-to-point profile. Because the point-to-point profile is associated with a specific IP address, the filter identifier implicitly defines the interface to which the rules apply.
See Point-to-Point Protocol over Ethernet.
See pending page queue.
See Peer-to-Peer Remote Copy.
PPRC Extended Distance (PPRC-XD)
An optional feature for the ESS that maintains a fuzzy copy of a logical volume (LVOL) on the same ESS or on another TESS. PPRC-XD ensures that all modifications that any attached host performs on the primary LVOL are also performed on the secondary LVOL at a later time. The original order of update is not strictly maintained. See also Peer-to-Peer Remote Copy, synchronous PPRC.
See PPRC Extended Distance.
See primary power supply.
See primary POI task.
See Point-to-Point Tunneling Protocol.
See purchase requisition.
See primary rate access.
- A standardized form of comment which has meaning to a compiler. A pragma usually conveys non-essential information, often intended to help the compiler to optimize the program. See also directive.
- A preprocessor directive that is not specified by the ISO standard. Pragmas often control actions of the compiler and linker. A pragma always begins with a number sign (#).
See People's Republic of China.
- In MIME messages, the area after the headers.
- A sequence of binary characters recorded at the beginning of each block of data, on a phase-encoded magnetic tape, for the purpose of synchronization when reading forward.
Preboot Execution Environment (PXE)
An industry standard target/server interface that allows networked computers that are not yet loaded with an operating system to be configured and booted remotely. PXE is based on Dynamic Host Configuration Protocol (DHCP).
Data in output member cells that is computed prior to, and in anticipation of, ad-hoc requests. Pre-calculation usually results in faster response to queries at the expense of storage space. Data that is not pre-calculated must be calculated at query time. See also derived data.
- An attribute of a timestamp that describes the total number of decimal digits in the fractional seconds part of the value.
- An information retrieval measurement that specifies the proportion of relevant data to all retrieved data. Precision is a positive predictive value. Information retrieval is best measured by using both precision and recall. See also recall.
- In information analysis, a measurement of the ability to distinguish between nearly equal values.
- The degree of discrimination with which a quantity is stated. For example, a three-digit numeral discriminates among 1000 possibilities.
- The number of straight line segments used to approximate one segment of a spline.
- A scoring process in entity resolution that is used to determine whether two compared attributes in an entity represent the same attribute. For example, name precision determines whether two compared names represent the same name. See also entity resolution.
- In GL, the number of digits that are printed or displayed.
- A measure of the ability to distinguish between nearly equal values.
- A value that a user defines to indicate how much tolerance a computation involving floating-point arithmetic should allow, that is, how exact it should be.
- An attribute of a number that describes the total number of binary or decimal digits.
To process programs that contain SQL statements before they are compiled. SQL statements are replaced with statements that will be recognized by the host language compiler. The output from a precompile process includes source code that can be submitted to the compiler and used in the bind process.
- Environmental and state conditions that must be fulfilled before the component or system can be executed with a particular test or test procedure. (ISTQB) See also postcondition.
- A group of rule statements in which the user defines global variables for a decision table or decision tree and conditions that must be met before any rows or branches in the decision table or tree can be executed.
- A definition of what must be true when a task or process starts.
See pre-calculated data.
- An activity in a dependency relationship that logically precedes another.
- A job or job stream that must complete successfully before successor jobs or job streams can be started. See also successor.
Predefined Devices object class
Represents each device type, as determined by class, subclass, and type. The Predefined Devices Object Class contains basic information about the devices, such as device method names and how to access the information contained in the other object classes.
predefined dynamic kit
A preconfigured dynamic kit that shoppers can add directly to the shopping cart without additional configuration. For example, if a dynamic kit consists of multiple computers, monitors, and keyboards, the associated predefined dynamic kit is the configured computer system. Dynamic kits support multiple predefined dynamic kits.
A message with a description that is created and stored in a message file before it is sent by the program. See also immediate message.
predefined prompt dependency
A prompt dependency that is defined in the database and can be associated to any job or job stream. See also prompt dependency.
A fixed value defined by IBM that has a special use in the control language and is reserved in the operating system. A predefined value usually has an asterisk (*) as the first character in the value.
- The part of a node test that attempts to identify a node in a path.
- An expression used as part of a filter, consisting of a data item, an operator, and a value. A predicate is used to restrict the occasions when an event is emitted.
- An element of a search condition that expresses or implies a comparison operation.
- A Boolean logic term denoting a logical expression that determines the state of a variable.
A lock held on index keys that qualifies for a predicate. In a predicate lock, exclusive predicates consist of a single key value, and shared predicates consist of a query rectangle and a scan operation such as inclusion or overlap.
Predictable Resource Location
An attack technique used to uncover hidden website content and functionality. The attack searches for content in standard locations that is not intended for public viewing, such as temporary files, backup files, configuration files or sample files.
A write operation that can perform a cache operation without knowledge of the existing format on the medium. All write operations on fixed-block architecture (FBA) direct access storage devices (DASDs) are predictable. On count-key-data (CKD) DASD devices, a write operation is predictable if it performs a format write operation for the first data record on the track.
A business process and a set of related technologies that are concerned with the prediction of future possibilities and trends. Predictive analytics applies such diverse disciplines as probability, statistics, machine learning, and artificial intelligence to business problems to find the best action for a given situation. See also data mining.
- A component of z/OS that detects abnormal behavior before it results in a soft failure.
- A scheduled evaluation of system data that detects and signals parametric degradation which might lead to functional failures.
Predictive Model Markup Language (PMML)
An XML-based language defined by the Data Mining Group that provides a way for companies to define predictive models and share models between compliant vendors' applications.
predictive text (T9)
An input method on multi-tap keyboards (9 keys) that predicts the word based on every possible letter combination. For example, pressing "228" predicts the word "cat." See also multi-tap.
In WebSphere MQ, a shutdown of a queue manager that does not wait for connected applications to disconnect, or for current MQI calls to complete. See also immediate shutdown, quiesced shutdown.
One or more commands specified by the system administrator that run before the cluster manager runs a particular event script. Pre-events are usually site-specific scripts integrated into the system after it is installed.
A set of console user preferences that can be assigned to roles. A preference profile contains settings that determine the state of the navigation area and the views available for members of the role.
The primary computer used by an application running under Microsoft Cluster Server control. After a failover to another computer, MSCS monitors the preferred computer until it is repaired, and as soon as it is running correctly again, moves the application back to it.
The currency indicated by a customer as the one in which he or she would prefer to see prices. The preferred currency is indicated in the customer profile. See also shopping currency, supported currency.
The language indicated by a customer as being the one in which he or she would like to conduct transactions. The preferred language is indicated either in the customer profile or by use of the langId parameter, which is available from the URL-based controller commands. See also shopping language.
preferred primary cluster caching facility
The cluster caching facility that the cluster manager attempts to start as the primary cluster caching facility when a DB2 pureScale instance is started. See also cluster caching facility, primary cluster caching facility.
preferred substitution association
An association of items that provides the ability to recognize that an ordered item is to be substituted by a preferred item prior to fulfilling the order for the original item. The preferred substitute is almost identical to the original item.
preferred substitution item
An existing item that is associated with an item in a category so that all the items in the assigned category are associated to the existing item as a preferred substitution.
preferred transport class
In OSI, a transport class that an application entity initially requests during association establishment. See also alternative transport class.
- A unique identifier that defines the functional area that a tag belongs to. The prefix is defined in the JSTL Namespace. For example, prefix=”c” means that all tags that start with c: are part of the core functional area tag library. The c in c: is the prefix of the tag.
- An affix that appears at the beginning of a name. For example, in the family name "de Rosa," the affix "de" is a prefix.
- A code at the beginning of a message or record.
A process by which an environment or library is initialized once and can then be used repeatedly to avoid the inefficiency of initializing the environment or library each time it is needed.
A bid that is either rolled over from an RFQ or RFP or entered by the buyer on behalf of the supplier prior to actual bidding. Suppliers can accept or reject the preliminary bids for regular items and modify the discount bid values while accepting the reverse auction invitation.
A utility that preprocesses an object for certain programs. See also binder.
A file that has been copied to server storage, but has not been replaced with a stub file on the local file system. An identical copy of the file resides both on the local file system and in server storage. Premigrated files occur on UNIX and Linux file systems to which space management has been added. See also file state, migrated file.
An optional phase of link activation that occurs after physical connection of the link has been established. During this phase, polling might occur to determine whether the adjacent link station is active. During this phase, prenegotiation XID3s are also exchanged to allow each node to verify the identity of the adjacent node. See also connect phase, contact phase.
To open a DEDB area after the first checkpoint following IMS control region initialization or during /START AREA command processing. If an area is not preopened, it will be opened during the first read request for the area.
- To send an SQL query to the database, to verify that it is syntactically correct, and return the result set columns. See also parse.
- To convert an SQL statement from text form to an executable form. See also program preparation.
- To convert an SQL statement or XQuery expression from text form to an executable form, by submitting it to the SQL and XQuery compiler.
prepare in progress (PIP)
The prepare in progress logical unit of work (LUW) state indicates that the current LUW is preparing its resources to commit. A failure during PIP state results in a rollback.
A sheet of paper (form) containing a preprinted design of constant data on which variable data can be printed. See also forms overlay.
preprocessing exit program
An exit program that performs preprocessing when an operation is requested against an exit point. An example of a preprocessing exit program is the Preprocessing Exit Program for Add.
- In emulation, a program that converts data from the format of an emulated system to the format accepted by an emulator.
- A routine that processes source code before the code is compiled, resulting in altered source code.
- A routine that performs initial processing and translation of source code or data prior to compiling the source code or processing the data in another program such as an emulator.
A collection of app testing features that collect in-depth details about issues and problems with an app. The testing features identify the device and user who is experiencing bugs so that developers can obtain logs and other information to correct problems. See also preproduction mode.
An operating state where internal testers use all data-collection features to provide detailed information regarding an app's behavior and performance. See also preproduction library.
A high-level plan of system activity containing job streams and dependencies. It is created automatically when the production plan is created for the first time. It is extended if the production plan is extended.
A component or service that is needed before a component can be installed. In other words, the components, resources, or services listed as prerequisites of a component must be installed before the component can be installed.
A temporary solution to or a bypass of a problem that is necessary to provide a complete solution to correct a problem. The system requires that you apply the prerequisite fix either before the PTF that needs it or with the PTF that needs it. See also corequisite fix, distribution requisite fix.
In RPG, a table that is loaded at the same time as the source program, before the program actually begins to run. See also runtime table.
A set of mathematical techniques that computationally synthesize data to make predictions and then suggest decision options to take advantage of the predictions and improve business performance.
See online status.
- In the Distributed Computing Environment (DCE), an unambiguous name that is used to identify a set of access points.
- In OSI, an address that uniquely identifies an application entity. The presentation address consists of one or more NSAP addresses, a TSAP selector, an SSAP selector, and a PSAP selector.
presentation control information (PCI)
The invisible set of controls that determine the presentation attributes of information such as color, intensity, loudness, and window size. See also machine-readable information.
presentation graphics feature (PGF)
In the Tivoli NetView Performance Monitor, a feature used with the Graphical Data Display Manager to generate online graphs in the NetView Performance Monitor graphic subsystem.
In OSI architecture, the layer that provides services that enable functional units in the application layer to select a common syntax in order to define data and operations to be performed on the data.
The part of a distributed application that is concerned with the user interface of the application. See also business logic.
In printing, a software component that communicates with a printer using a printer data stream, such as the IPDS data stream, to print pages, download and manage print resources, and handle exceptions.
- A portion of the device's buffer storage, allocated to a partition, that contains only display data that CICS sends to that partition. See also partition.
- An array that contains the data and attributes associated with a window.
- The display space on a display device.
- A conceptual two-dimensional surface in storage on which data for a portion of the display surface is represented.
- In the context of the Emulator High-Level Language Application Programming Interface (EHLLAPI), the area in computer memory that corresponds to the user's screen image.
- The display data buffer associated with a partition. The size of the presentation space is defined as equal to, or larger than, the size of the viewport. When the presentation space is equal to the viewport size, all the data in the presentation space is displayed. When the presentation space is larger than the viewport, the user must move the scrolling window within the presentation space to display the data within the viewport. See also scrolling window, viewport.
- The space that contains the device-independent definition of a picture.
presentation space orientation
In architecture, the number of degrees and minutes a presentation space is rotated in a specified coordinate system. For example, the orientation of printing on a physical medium, relative to the Xm-axis of the Xm,Ym coordinate system.
See composed text.
Presentation Text Object Content Architecture (PTOCA)
An architecture that provides a collection of constructs used to interchange and present presentation text data, such as printing text data on a page, page segment, or overlay.
An installation method used when a previous version of BOS is installed on your system and you want to preserve the user data in the root volume group. However, this method overwrites the /usr, /tmp, /var,and /(root) file systems, so any user data in these directories is lost. System configuration must be done after doing a preservation installation.
pre-session extended rule
A rule that defines variables that have global scope. Pre-session rules are processed before the translation object is processed, and apply to every extended rule defined in the map.
preset terminal security
When a CICS region is started, the signing on of selected terminals as users whose user IDs are the terminal identifiers. Persons using these terminals have the authorizations given to the terminals.
To purposefully touch a touchscreen display for longer than a tap, but shorter than a hold. Typically, apps use press gestures to bring up extra menus. See also gesture.
A phase of the IPL sequence that takes place prior to static paging, where normal Licensed Internal Code functions cannot access data from any disk (neither load-source nor non-load-source disk units). See also full paging, limited paging, static paging.
A type of identity assertion where trust is presumed and additional trust validation is not performed. Use this mode only in an environment where trust is established with some other mechanism.
Proactive maintenance that is performed on a regular basis, which is designed to maintain assets, locations, or building systems in a higher functions manner and avoid larger and more costly maintenance.
preventive maintenance package (PMP)
A maintenance level update for a system. A PMP includes updates for the Base Operating System (BOS) and for each optional software product that is installed on a system.
preventive maintenance record (PM)
A template for scheduled preventive maintenance work. PMs can contain job plan and corresponding safety plan information that the system copies to work orders. See also PM alert.
preventive maintenance schedule (PM schedule)
A schedule that provides criteria for when preventive maintenance will occur. The maintenance can be time-based, such as a monthly inspection, or reading-based, such as investigative maintenance in response to a high temperature reading.
A window that is displayed when a user clicks a marker on either a geospatial map or a location map, or when a user clicks a row on the List tab. The window displays information about the associated data item.
A pane that lets users read the content of the document that is selected in the view pane. If Notes is set to preview document links, users can also view documents linked to the selected document.
previous hop data
A set of information that identifies the remote sender of a request to attach a task and creates a trail to be followed back into the previous system. This process enables data gathering and monitoring to continue in the region that sent the request. Previous hop data is created for a task when it has been initiated by a task in another CICS system.
The last required release of the system (such as Release 1.0) prior to the current release (such as Release 2.0), including any modification levels (such as Release 1.0 Modification Level 1 or Modification Level 2) that were not required.
See private header.
price list assignment
A list that an enterprise user can assign to customers of the corresponding enterprise. Depending on the business requirements, an enterprise user can assign the price list to a set of customers who fulfill certain criteria.
A means of measuring which variable should enter, or which should leave, a basis. Pricing is a tactic in the simplex method by which each variable is evaluated for its potential to improve the value of the objective function.
A positive percentage value that may be less than or equal to 1.00, to affect a price decrease or increase, respectively. The results of a pricing method price are multiplied by this pricing factor to arrive at the renewal price.
pricing organization user
A user that can perform pricing administration tasks such as creating a price list, managing a price list, and so on. A pricing organization user with have read-only access to certain catalog administration tasks such as modifying the details of an item, and no access to certain catalog administration tasks such as creating an item.
In operations research, particularly in the discipline of mathematical programming (MP), a standard way of stating a linear programming (LP) problem as a maximization of an objective function subject to a matrix of linear constraints over variables with bounds. Every feasible solution of the primal problem yields a bound on the optimal solution of the dual. If the primal problem has an optimal solution, then so does the dual.
- Pertaining to an irreducible unit of data, such as a single constant, variable, or array element.
- Pertaining to an object that is in the object storage hierarchy and can be retrieved. The last time the object was used or its actual or expected frequency of use is not of consequence in this process.
primary account number (PAN)
The primary identifier for a payment method, according to the payment type group it belongs to. For example, the primary account number of a credit card is the credit card number.
primary administrative server
The administrative server that runs on the same engine as the master metadata server and processes all administrative requests that are initiated from the SAN File System console and those requests initiated from the administrative command-line interface (ACLI) that is logged into the master metadata server.
primary authorization ID
The authorization identifier used to identify an application process to DB2 for z/OS. See also secondary authorization ID.
In the GDDM function, the axis used to plot data in a business chart. See also secondary axis.
primary cluster caching facility
The cluster caching facility that is currently handling requests from the members in an instance. See also cluster caching facility, preferred primary cluster caching facility, secondary cluster caching facility.
primary Copy Services server
One of two Copy Services servers in a Copy Services server group. The primary Copy Services server is the active Copy Services server until it fails; it is then replaced by the backup Copy Services server. See also backup Copy Services server, Copy Services client, Copy Services server, Copy Services server group.
In high availability disaster recovery, the main database, which is accessed by applications. Applications apply updates to the primary database, and those updates are propagated on the standby database by using log shipping.
primary data set
When referring to a data set collection, the first data set allocated. For individual data sets being stacked, the primary data set precedes the data set being stacked and is allocated closest to it. See also master primary data set.
primary delay interval (PDI)
The interval that must elapse between the apparent loss of surveillance signal from the alternate system and any reaction by the active system. This interval is set by the PDI system initialization parameter.
One device of a dual-copy or remote-copy volume pair. All channel commands to the copy logical volume (LVOL) are directed to the primary device. The data on the primary device is duplicated on the secondary device. See also secondary device.
primary disk pool
An independent disk pool that defines a collection of directories and libraries and may have other secondary disk pools associated with it. A primary disk pool also defines a database for itself and other disk pools that may be added in its disk pool group.
primary domain controller (PDC)
See domain controller.
primary end of a session
The end of a session that uses primary protocols. The primary end establishes the session. For an LU-LU session, the primary end of the session is the primary logical unit. See also half-session, secondary end of a session.
primary entry point
The location that receives control when the module is invoked by its primary, or member, name. alternate entry point. The location, other than the primary entry point, that can receive control from, or be referenced by, another module. See also alternate entry point.
- Any of the following types of expressions: a) identifiers, b) parenthesized expressions, c) function calls, d) array element specifications, e) structure member specifications, or f) union member specifications.
- Literals, names, and names qualified by the :: (scope resolution) operator.
- The basic primitive structure of the XQuery language. Primary expressions include literals, variable references, context item expressions, constructors, and function calls. A primary expression can also be created by enclosing any expression in parentheses, which can help to control the precedence of operators.
- In the DDS for a join logical file, the first physical file specified on the JFILE keyword. See also secondary file.
- In RPG, if specified, the first file from which RPG reads a record. In multifile processing, the primary file is used to determine whether the MR indicator is set on. See also full procedural file.
- For certain types of join operations using Query, the first of all files that are joined in a query definition. The data from this file is used in every record formed by a join specification.
- A focal point that is understood to be the preferred source of management services support for a particular category.
- A network node that receives alerts from nodes that the user has defined in a sphere of control. See also default focal point.
In System Manager, the folder into which the documentation of the corresponding development folder is stored if dynamic naming is not allowed for the option or if no override folder name is specified at install time.
- A basic group that has authority to access and configure settings on a network entity.
- A group profile whose authority to an object is stored with that object. Primary group authority may provide better performance than private group authority.
- In concurrent groups, the group that is assigned to all files that a user creates.
primary group buffer pool
For a duplexed group buffer pool, the structure that is used to maintain the coherency of cached data. This structure is used for page registration and cross-invalidation. The z/OS equivalent is old structure. See also secondary group buffer pool.
primary group layout
The allocation of the graphic characters of group 1 to the keys of a particular keyboard, defined by a national standard or established by common usage in a particular country or group of countries (see ISO/IEC 9995-1). See also primary layer.
primary Hardware Management Console (primary HMC)
The System z Hardware Management Console (HMC) through which data personnel create and manage an ensemble. This HMC owns configuration and policy information that the zManager uses to monitor, manage, and adjust resources for all members of this ensemble. See also alternate Hardware Management Console, Hardware Management Console.
See primary Hardware Management Console.
- In VSAM, the set of primary keys that provide the standard path for access to the data set.
- An index that enforces the uniqueness of a primary key.
The online instance of a replicated resource group. The node that has a resource group in the online state activates all the resources in the resource group. See also replicated resource group.
- In each record of a VSAM KSDS, an identifying field. The key of each record is a field in a predefined position within the record. Each key must be unique in the data set.
- An object that uniquely identifies an entity bean of a particular type.
- In a relational database, a key that uniquely identifies one row of a database table. See also constraint, foreign key, unique key.
primary key prefix
A two-digit prefix for a colony. It can be any number from 10û99 (except 19 and 20). The first two digits of the Primary Key are used to identify a colony through the Colony Prefix.
The national language installed on the system as the default language used to display and print information. The primary language is also used to service the system. See also secondary language.
In System Manager, for a code load, the library in which the code load is stored if dynamic naming is not allowed for the option or no override library names are specified at install time. For language loads, the library in which the language load is stored if the language load identification matches the primary language of the system and either dynamic naming is not allowed for the option or no override library names are specified at install time.
A set of one or more log files that are used to record changes to a database and for which storage is allocated in advance. See also secondary log.
primary logical unit (PLU)
In SNA, the logical unit that contains the primary half-session for a particular logical unit-to-logical unit (LU-to-LU) session. See also primary half-session, secondary logical unit.
The name contained in the primary directory entry for a library memory, which is used for creating, copying, and deleting the member. A library member always has one primary name and possibly one or more aliases.
- A device that runs a workload. See also standby node.
- A cluster node that currently has the principle copy of a cluster resource. All replications of a resilient resource originate from the primary copy of the resource.
- The Sterling Connect:Direct node that executes the process.
- See home node.
primary optical link
A connection between the system and an expansion unit. The hardware that creates this link is the local optical link card, the remote bus adapter, and the optical cables that connect the two.
See owner organization.
A logical partition that provides certain general functions on which all logical partitions are dependent. The primary partition is the only partition that is active in a system that has a single partition. All partition management functions are performed from this partition. If this partition is powered off or restarted, for example, the entire system is powered off or restarted.
- The channel that an operation first uses. See also alternate path.
- In CCP, one of two paths defined for information flow to and from the physical units attached to the network by means of an IBM 3710 Network Controller. The primary path is the path that is normally used.
primary POI task (PPT)
In Tivoli NetView for OS/390, the subtask that processes all unsolicited messages that are received from the VTAM program operator interface (POI) and delivers them to the controlling operator or to the command processor. The PPT also processes (a) the initial command that is specified to execute when Tivoli NetView for OS/390 is initialized and (b) timer request commands that are scheduled to execute under the PPT.
primary program operator application program (PPO)
A program operator application program that is authorized to receive unsolicited messages. When the PPO is active, all unsolicited messages go to the PPO. Conversely, when the PPO is inactive, unsolicited messages go to the system console. There can be only one PPO in any domain. See also secondary program operator application program.
primary RACF database
The RACF database designated in a data set name table that contains the RACF profiles used for authorization checking. The primary RACF database can consist of up to 90 data sets. See also backup RACF database.
primary rate access (PRA)
See primary rate interface.
primary rate interface (PRI)
An ISDN interface normally used by large sites, providing 30 (E1) or 23 (T1) B-channels of 64 kbits per second and one D-channel for signaling. This is often known as 30B+D or 23B+D. See also basic rate interface.
primary rate ISDN (PRI)
See primary rate interface.
The process in which the original primary database can rejoin a high availability disaster recovery pair after a failover. The original primary database can rejoin only as the new secondary database in the HADR pair.
The replica designated to be the only recipient of updates by the Administration Process. By updating a primary replica and then replicating that database to other replicas on other servers, you avoid creating replication conflicts.
- A database server that communicates with the database, client, web server, and other secondary servers.
- A database server participating in a high-availability configuration. A primary server permits read and write access from client applications and owns the logical logs that are sent to secondary servers.
- The server on which all resources that are to be deployed exactly once per instance or once per organization unit (OU) are deployed.
- The session between a class 1 terminal and the active IMS.
- An extended recovery facility (XRF) session between the active application subsystem and a terminal user.
- A physical or virtual site that is made up of hardware, network, and storage resources. Typically, production operations run at the primary site. Data can be replicated to a secondary site for disaster recovery and failover operations. See also secondary site.
- The highest priority site for a resource group. A resource group might have a backup site (secondary site). See also replicated resource group.
primary space allocation
The amount of space requested by a user for a data set when it is created. See also secondary space allocation.
- On a point-to-point channel, the station that gains control of the channel first. On a multipoint channel, the station controlling communications.
- In high-level data link control (HDLC), the part of a data station that supports the primary control functions of the data link, generates commands for transmission, and interprets received responses.
- In SNA, the station on an SDLC data link that is responsible for the control of the data link. There must be only one primary station on a data link. All traffic over the data link is between the primary station and a secondary station. Specific responsibilities assigned to the primary station include initialization of control signal interchange, organization of data flow, and actions to perform error control and error recovery functions. See also secondary station.
A direct access storage device (DASD) volume available to users for data allocation. The volumes in primary storage are called primary volumes. See also DASD volume, migration level 1, migration level 2, primary volume, storage hierarchy.
primary storage pool
A named set of volumes that the server uses to store backup versions of files, archive copies of files, and files migrated from client nodes. See also copy storage pool, server storage, storage pool, storage pool volume.
A coupling facility list structure that contains shared queues or shared resources. See also overflow structure.
- The controlling remote system in a push-to-client environment.
- In a remote journal network, the System i system where the original database resides.
primary system console
A workstation that is attached to the first input/output processor that is capable of supporting workstations. If Operations Console has been configured, a personal computer (either at a local location or a remote location) becomes the primary system console.
primary system controller
A system that controls the management and dispatching of processing requests within the Gentran Server for Windows system, manages the audit functionality, maintains status information for the system and controls all other system components.
primary system name
In SNADS, the system name of the highest logical unit in the network. See also secondary system name.
See initial thread.
primary vital-record specification
The first retention and movement policy that DFSMSrmm matches to a data set and volume used for disaster recovery and vital record purposes. See also secondary vital-record specification, vital record specification.
- In a stand-alone Metro Mirror or Global Mirror relationship, the target of write operations issued by the host application. See also relationship.
- A volume that is mirrored for backup on a remote storage system.
- A volume managed by DFSMShsm containing data sets that are directly accessible to the user. See also primary storage.
- A simple and fundamental data structure, API, algorithm, or system service that serves as a building block for more complex solutions, applications, or environments.
- A drawing command that is made up of the smallest possible parts and is the basis for more complex scenes. Examples of primitives include arc, line, circle, polygon, and charstr.
- A message processing node that cannot be further subdivided. See also subflow node.
- The figures created by drawing commands.
- A message sent from one process to another.
- See operation.
primitive analysis engine
An analysis engine that is composed of a single annotator, but does not contain component analysis engines. See also analysis engine.
An operator that is implemented in the C++ or Java language and that includes an operator model that describes the syntax and semantics of the operator. See also custom operator, generic operator, non-generic operator, operator, operator model, streams processing application.
- In Java, a category of data type that describes a variable that contains a single value of the appropriate size and format for its type: a number, a character, or a Boolean value. Examples of primitive types include byte, short, int, long, float, double, char, boolean. See also boxing.
- A predefined basic data type without any substructure, such as an integer or a string.
In Enhanced X-Windows, a widget that instantiates its own children of a known class and does not expect external clients to do so. Primitive widgets do not have general geometry management methods. Primitive widgets that instantiate children are responsible for all operations requiring downward traversal below themselves.
An entity that can communicate securely with another entity. A principal is identified by its associated security context, which defines its access rights. See also credential.
principal components analysis (PCA)
A method of data reduction that summarizes the total variance in a large number of related fields. This method works by using a small number of derived fields. See also factor analysis.
The terminal or logical unit that is connected to a transaction at its initiation. See also alternate facility.
principal HADR standby database
In an HADR multiple standby system, the standby database that allows any synchronization mode. Only one principal HADR standby database can be defined in a multiple standby system. See also auxiliary HADR standby database, standby database.
- In the Kerberos protocol, the name by which the Kerberos principal is identified. The principal name usually consists of either a) a user name and a realm name or b) a service name, host name, and a realm name. See also Kerberos principal.
- The name by which a principal is known to the Distributed Computing Environment (DCE) security services.
principal primary library
In System Manager, a primary library into which the objects that were created in the principal development library are stored when no overriding library name is specified at installation time.
principal standby database
See principal HADR standby database.
See type bar.
- In architecture, a measurement of the ratio of the reflectivities between the bars and spaces of a bar code symbol, commonly expressed as a percent.
- In optical character recognition, a measure of the contrast between a printed character and the paper on which the character is printed. (A)
print control object
In architecture, a resource object that contains layout, finishing, and resource mapping information used to present a document on physical media. Examples of print control objects are form maps and medium maps.
print data file
In VM, a data file, usually created by an application program, that contains the actual information to be printed and some of the data that controls the format of the printing. The three kinds of print data files are composed text, line format, and mixed format. See also print data set.
print data set
A data set created by an application program that contains the actual information to be printed and, optionally, some of the data that controls the format of the printing. The types of print data sets are composed text, line format, and mixed format. See also auxiliary data set, print data file, print file.
An object used to manage printing that is created and maintained by the PrintManager program. Print descriptors describe where a print job is printed, how a print job is processed, and how output appears. The print descriptors contain capabilities and defaults of options used for printing. The system-recognized identifier for the object type is *PDG.
In CDE, the Front Panel control used to start the Printer software application. Dropping a file on the control displays a dialog box you can use to print the file to the default printer.
An object in the Printer Inventory that contains information about a printer or set of printers that share the same characteristics. A printer definition contains information that is used to print files.
- A device file that determines what attributes printed output will have. A particular printer may or may not support all of the attributes specified in a printer file.
- A device file created by the user to support a printer device.
In Infoprint Server, a set of files that contain information about printers. The Printer Inventory includes such objects as printer definitions, functional subsystem (FSS) definitions, and job selection rules for IP PrintWay.
In PSF/VSE, the member of a phase library containing user-specified print parameters to print a job on a page printer. The printer-parameter macroinstruction, provided with PSF/VSE, stores the user-specified parameters as a member of a phase library.
- A 3270 Host Connection Program 2.1 and 1.3.3 for AIX (HCON) mode of operation during interaction with a host computer that emulates a 3286/87 printer.
- A PC program that allows a personal printer to emulate a host system printer.
A file that is created for the purpose of printing data. A print file includes information to be printed and, optionally, some of the data. See also print data set.
print file document
A Printing Systems Manager (PSM) object that represents text or data to be printed by a job. See also print resource document.
Printing Systems Manager (PSM)
An IBM licensed program that applies print administration and management technology to a cross-platform, client/server print system. PSM provides a set of (a) printing functions for submitting and controlling print jobs and (b) systems management and operator functions to control print spoolers and print supervisors. PSM is based on the Palladium distributed print system.
- In printing, a single line of text.
- In the formatting of line data, refers to the output generated by one data record.
- In a display image, a horizontal line at the top or bottom of a string of characters.
Print Management Facility (PMF)
An interactive menu-driven program that is used to create and modify resources (fonts, form definitions, page definitions, and page segments) for use on IBM page printers.
printout format definition (PFD)
In AFP Utilities, a file member that contains information about the record layout, page layout, record selection, and database file name. A PFD is used to print the records of a database file member in various formats.
- Any location on a medium where a character can be printed. See also addressable point.
- In printers, the physical positions of the characters constituting a print line relative to the form.
A set of ODF programs that perform the tasks of fetching report text from the OnDemand base system, formatting it as specified in the PPT row, and outputting it to the appropriate device with the appropriate delivery information. Parameters for formatting and outputting are maintained by using the DM, BM, and B3 panels. Delivery information is maintained by using the UM panel.
- The measure of the quality of printed output relative to existing standards and in comparison with jobs printed previously.
- In bar codes, the measure of compliance of a bar code symbol to the requirements of dimensional tolerance, edge roughness, spots, voids, reflectivity, PCS, and quiet zones defined within a bar code symbology.
print resource document
A Printing Systems Manager (PSM) object that represents a resource, such as a graphic or font, that is used by a job to print a print file document. See also print file document.
Print Services Access Facility (PSAF)
An IBM licensed program that is a menu-driven, print parameter selection program for page printers controlled by PSF. PSF can create form definitions and page definitions and can submit print jobs to page printers driven by PSF.
- A feature of i5/OS that provides AFP system management and IPDS print management to IPDS printers that are connected to System i systems.
- An IBM licensed program that manages and controls the input data stream and output data stream required by supported IBM page printers.
See print chain.
print translation object
A translation object that organizes and formats the printout of EDI documents that are received from or sent to trading partners.. The print translation object enables users to view the EDI document in an easily readable format.
In IPDS architecture, a group of pages bounded by XOH-DGB commands and subject to the group operation "keep group together as a print unit." A print unit is commonly referred to as a "print job."
See IP PrintWay.
- A way of determining the order in which jobs and job streams start.
- A property that determines the order in which business rules are executed in an application.
- A rank assigned to a task that determines its precedence in receiving system resources.
- In software development, a rank assigned to requirements or work items to determine the order in which they are worked on.
priority flow control (PFC)
A link-level flow control mechanism, IEEE standard 802.1Qbb. PFC operates on individual priorities. Instead of pausing all traffic on a link, PFC is used to selectively pause traffic according to its class.
priority level resource (PLR)
A marked resource known to PSF and deleted according to a modified deletion algorithm. When resources according to reasonable resource loaded value, PSF deletes all non-PLR resources before deleting any PLR resources. A frequently used resource can be marked as PLR with the Resource Exit; this improves its chances of being retained at the data set end.
In SNADS, a queue that contains distribution queue entries for distributions with a service level of fast, status, or data high. When send times and queue depths are satisfied for both the priority and normal queues, the priority queue is serviced first. See also normal queue.
In CICS Transaction Server, an element of MVS virtual storage below the 16 MB line. It contains the local system queue area (LSQA), scheduler work area, subpools 229 and 230, a 16 KB system region area, and a private user region for running programs and storing data.
The authority specifically given to a user for an object that overrides any other authorities, such as the authority of a user's group profile or an authorization list. See also owner authority, primary group authority, public authority.
private automatic branch exchange (PABX)
An automatic private switching system that services an organization and is usually located on a customer's premises. Often used synonymously with private branch exchange.
private branch exchange (PBX)
A switching system located on a customer's premises that consolidates the number of inside lines (extensions) into a smaller number of outside lines (trunks). Many PBXs also provide advanced voice and data communications features.
- In XSD, a business object attribute that defines an anonymous complex type instead of referencing a named complex type.
- A business object that is contained within other business objects. Private business objects are visible only to the containing business object, thereby making them private. See also business object.
A trucking fleet that is owned by a shipper for transporting its own freight. In Sterling TMS, a private fleet is set up as a separate carrier organization. See also dedicated fleet, preferred fleet.
- In computer security, the secret half of a cryptographic key pair that is used with a public key algorithm. The private key is known only to its owner. Private keys are typically used to digitally sign data and to decrypt data that has been encrypted with the corresponding public key. See also public key.
- In secure communication, an algorithmic pattern used to encrypt messages that only the corresponding public key can decrypt. The private key is also used to decrypt messages that were encrypted by the corresponding public key. The private key is kept on the user system and is protected by a password. See also key, public key.
private key authentication
See public key cryptography.
private key cryptography
A cryptographic algorithm that uses a single private key to encrypt and decrypt a transferred message. The private key is shared between the sender and the recipient. See also public key cryptography.
privately defined object
See locally defined object.
privately managed context
A work context that can be switched from one task to another. A privately-managed context is generally used by a work manager, such as the Information Management System (IMS).
In the Simple Network Management Protocol (SNMP), a MIB module that is located under the private branch of the Structure of Management Information (SMI) and that is specified exclusively by a specific enterprise (a corporation or university, for example).
A network established and operated by a private organization or corporation for users within that organization or corporation. See also public network.
- In DCE X/Open Object Management (XOM), an object that is represented in an unspecified fashion.
- In the DCE X/Open Directory Service (XDS), an object management (OM) object created in the workspace using the OM functions.
In VSE, a partition allocated for the execution of a specific program or application program. Storage in a private partition is not addressable by programs running in other virtual address spaces.
private service bundle
A service bundle that is not explicitly mentioned in the customization definition document (CDD), but that is included in a service bundle set and provides resources required by another service bundle. In a customization definition report, private service bundles are listed, and their names are followed by the string [private].
A sort that takes place in the agent private memory of a database agent. See also agent private memory.
private storage pool
A storage pool containing a specified amount of storage that can be used by only one subsystem. See also shared storage pool.
- The right to use or change the contents of a database, table, table fragment, or column.
- In SQL, a capability given to a user by the processing of a GRANT statement.
- See permission.
- The capability of performing a specific function, sometimes on a specific object. See also authority level, authorization, supervisor.
- The right to access a specific database object in a specific way. A privilege is controlled by users with access control (ACCESSCTRL) or security administrator (SECADM) authority or by users who have the privilege and the ability to grant it to others. Privileges can include rights to create, delete, and retrieve data from tables.
A level of authority that is granted to an administrator. The privilege class determines which administrative tasks the administrator can perform. See also authority, node privilege class, operator privilege class, policy privilege class, storage privilege class, system privilege class.
privileged attribute certificate (PAC)
A privileged document that contains such information as the client's name and the groups to which it belongs. Its format is dependent on the underlying security mechanism.
System control instructions that can only run in the processor's privileged, or supervisor, state. Privileged instructions generally manipulate virtual machines or the memory manager and are not used ordinarily by application programmers.
A hardware protection state in which the processor can run privileged instructions. See also unprivileged state.
- In Informix, a user who was granted one or more administrator roles.
- A user logged into an account with root user authority.
The process of referring to scans that were run using different user privileges, in order to test whether privileged resources are accessible to users with insufficient access permissions.
- A collection of privileges for working with system components and functions. The administrator assigns privilege sets to users (user IDs) and user groups.
- For the predefined SYSADM ID, the set of all possible privileges. For any other authorization identifier, the set of all privileges that are recorded for that identifier in the DB2 for z/OS catalog.
See private management domain.
A measure of the likelihood that an event will occur. Probability values range from 0 to 1; 0 implies that the event never occurs, and 1 implies that the event always occurs. A probability of 0.5 indicates that the event has an even chance of occurring or not occurring.
See parole officer.
- A data collection job that itemizes and creates an inventory of assets, such as computers, controllers, disk drives, file systems, and logical units.
- Program code that collects troubleshooting information in the event of an error condition. This information is sent to First Failure Support Technology (FFST) or otherwise used in problem solving.
- A type of message that determines if a message with certain characteristics can be delivered to a specific recipient. This type of message is treated like a user message by the message transfer agent (MTA), except that it is never delivered to the recipient.
- A reusable set of Java code fragments and supporting attributes for collecting detailed runtime information about objects, arguments, and exceptions. See also Probekit.
- A process to measure information from part of the system and expose the information as one or more counters.
- A monitor that tests a transaction and then detects and reports any errors that were generated during that test.
A scriptable framework for doing byte-code insertion to probe the workings of a target program. See also probe.
The process of determining the source of a problem. Sources of a problem can include a program component, machine failure, telecommunication facilities, user or contractor-installed programs or equipment, or environmental failure such as a power loss, or user error.
problem isolation procedure (PIP)
Written information used by service representatives to repair IBM equipment. A PIP contains yes/no questions and procedures that direct the user to the failing part of the equipment.
problem management focal point
The management services responsible for the problem analysis and diagnosis for a sphere of control. An alert focal point is a subset of a problem management focal point.
A state during which the processing unit cannot handle input, output, and other privileged instructions. See also supervisor state.
Procedural Language SQL (PL/SQL)
The Oracle implementation of a language that provides procedural constructs for implementing control flow logic around traditional SQL queries and operations. See also SQL Procedural Language.
- A routine that does not return any value. See also declaration statement, user-defined procedure.
- In the Integrated Language Environment (ILE) model, a set of self-contained high-level language (HLL) statements that performs a particular task and returns to the caller. Individual languages have different names for this concept of a procedure. In C, a procedure is called a function.
- In COBOL, one or more successive paragraphs or sections, within the Procedure Division, that direct the computer to perform some action or series of related actions.
- In a programming language, a block, with or without formal parameters, that is initiated by means of a procedure call.
- A sequenced set of statements that may be used at one or more points in one or more computer programs, and that usually has one or more input parameters and yields one or more output parameters.
- A routine that can be invoked using the SQL CALL statement to perform operations that can include both host language statements and SQL statements. See also built-in procedure, external procedure, routine, SQL procedure, user-defined procedure.
The implementation of the logic of a procedure. See also routine body.
- In programming languages, a language construct for invoking execution of a procedure.
- A call made to a procedure within a module in a bound program. See also program call.
procedure correlation identifier (PCID)
An identifier generated by an SNA control point (CP) to (a) correlate search, activation, and deactivation requests and responses related to a specific session between logical units (LUs), and (b) identify this session for such purposes as problem determination, accounting, and performance monitoring. The PCID and the network-qualified name of the CP generating the PCID constitute the fully qualified procedure correlation identifier (FQPCID), which is unique across the network in which it is used.
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), the syntax for an operation, including its name, the data type of any value it returns, and the number, order, and data types of any parameters.
One of the four main parts of a COBOL program. The Procedure Division contains instructions for solving a problem. The Procedure Division may contain imperative statements, conditional statements, paragraphs, procedures and sections.
procedure library (PROCLIB)
A program library in direct access storage with job definitions. The reader/interpreter can be directed to read and interpret a particular job definition by an execute statement in the input stream.
procedure order profiling data
A portion of observability that is stored with a program that is produced by Integrated Language Environment (ILE) application profiling. The data lists the order in which the program's procedures were packaged and also indicates how the procedures should be packaged in the future if the program is rebuilt in some way. For example, if procedure A calls procedure B very often, then it is advantageous to package procedures A and B close together.
See routine overloading.
procedure pointer call
A high-level language call mechanism for specifying the address of a procedure to be called. The procedure pointer call provides a way to call a procedure dynamically. For example, by manipulating arrays or tables of procedure names or addresses, the application programmer can dynamically route a procedure call to different procedures. See also static procedure call.
procedure with logic
Any QMF procedure beginning with a REXX comment. In a procedure with logic, it is possible to perform conditional logic, make calculations, build strings, and pass commands back to the TSO environment. See also linear procedure.
- The sequence of documents or messages to be exchanged between the Community Managers and participants to run a business transaction.
- An instance of a program running on a system and the resources that it uses.
- A progressively continuing procedure consisting of a series of controlled activities that are systematically directed toward a particular result or end.
- An object that contains a user-created script of TurboIntegrator functions and commands to programmatically import data as well as create and modify TM1 objects, such as cubes and dimensions. A process can be run manually or contained in a chore to run at a scheduled time.
- A series of statements and parameters used to initiate Sterling Connect:Direct activity, such as copying files and running jobs.
- In Business Transaction Services (BTS), a collection of one or more activities. A process is the largest unit that CICS business transaction services can work with, and has a unique name by which it can be referenced and invoked. Typically, a process is an instance of a business transaction.
- See job.
- Automated tasks that run on agents. See generic processes, component processes, and application processes. See also application process, component process, generic process.
- A separately executable unit of work.
- In System Manager, a combination of systems management applications that accomplishes one or more customer tasks or a part of a task. A process can contain other processes.
- A sequence or flow of activities in an organization with the objective of carrying out work. In BPMN, a process is depicted as a graph of flow elements, which are a set of activities, events, gateways, and sequence flow paths that adhere to BPMN execution semantics.
- A series of related activities aimed at achieving a set of objectives in a measurable, usually repeatable manner. A process can specify any of the roles, responsibilities, tools, and management controls required to reliably deliver its outputs.
- For Common Programming APIs ToolKit, the collection of all i5/OS jobs sharing an activation group.
- An address space and single thread of control that executes within that address space, and its required system resources. A process is created by another process issuing the fork() function. The process that issues the fork() function is known as the parent process, and the new process created by the fork() function is known as the child process.
- In the Application Lab, a sequence of steps.
A container in the Process Center repository for process models and supporting implementations. A process application typically includes business process definitions (BPDs), the services to handle implementation of activities and integration with other systems, and any other items that are required to run the processes. Each process application can include one or more tracks.
In the IBM 3800 Printing Subsystem, the assembly that includes the air system, charge corona, cleaner, developer, drum, forms overlay, laser, operator panel, paper input ramp and splicer, and transfer station.
Process Center Console
An interface to the Process Center repository where administrators can create and manage process applications, manage user access to library items, install snapshots on test or production servers, and perform other tasks.
A data-container associated with a process. Process containers can be read by all the activities that make up the process. Note that they are not the same as the root activity's containers.
A system that regulates the management and dispatching of processing requests within the system. It allows the system translation load to be distributed for fast and efficient throughput. Systems In a single workstation system, all three controllers (communications controller, process controller, and the primary system controller) reside on the same machine.
process control PIP
For RosettaNet, a Partner Interface Process (PIP) that is used to communicate process states outside the context of the process instance with which it is associated. For example, PIP 0A1 (Notification of Failure or NoF) is a process control PIP that is used to communicate an exception condition that occurs outside the normal message choreography of the subject PIP.
Data that is accumulated in an XML document about a business process during the life of the process. Activities in the process add elements to the process data and use components of the process data to complete configured processing tasks.
- In MO:DCA, a document component that is defined by a structured field and that facilitates a form of document processing that does not affect the presentation of the document. Examples of process elements are Tag Logical Elements (TLEs) that specify document attributes and Link Logical Elements (LLEs) that specify linkages between document components.
- An element that defines an activity and is the basic element of a business process model.
process group ID (PGID)
The unique identifier representing a process group during its lifetime. A process group ID is a positive integer that is not reused by the system until the process group lifetime ends.
process group lifetime
A period of time that begins when a process group is created and ends when the last remaining process in the group leaves the group because either it is the end of the last process' lifetime or the last remaining process is calling the setsid() or setpgid() functions. X/Open. ISO.1.
- See process identification number.
- The unique identifier that represents a process. A process ID is a positive integer and is not reused until the process lifetime ends.
A defined activity in a processing rule that is performed against messages. See also action.
processing engine archive (PEAR)
A .pear zip archive file that includes a Unstructured Information Management Architecture (UIMA) analysis engine and all of the resources required to use it for custom analysis in enterprise search.
An embedded directive within an XML instance document that is passed to an application when the document is parsed. The processing instruction node is one of the kinds of nodes that are defined in the XQuery and XPath data model. See also node kind.
The logical nodes in the system where jobs are run. The configuration file can define one processing node for each physical node in the system or multiple processing nodes for each physical node. See also compute node, conductor node.
A connection between an application program and the CICSPlex SM API. A program can establish multiple processing threads, but each one is considered a unique API user; no resources can be shared across the boundary of a thread.
- The time that is required to handle a single order after it is delivered to a stop in a route. The processing time is used to calculate the departure and arrival of shipments that are built using a route itinerary template. See also on-premises time.
- The time it takes for an item to be received by a warehouse and made ready for shipment (inbound processing) as well as shipping it from the warehouse (outbound processing).
- For a thread or an agent performing work in a monitored time interval, the amount of elapsed time minus the amount of wait time. See also elapsed time, wait time.
- See processor.
- A functional unit within a computer that is responsible for a certain aspect of processing.
The period of time that begins when a process is created and ends when the process ID is returned to the system. X/Open. ISO.1. After a process is created with a fork() function, it is considered active. Its thread of control and address space exist until it terminates. It then enters an inactive state where certain resources may be returned to the system, although some resources, such as the process ID, are still in use. When another process executes a wait() or waitpid() function for an inactive process, the remaining resources are returned to the system. The last resource to be returned to the system is the process ID. At this time, the lifetime of the process ends.
In WebSphere Voice Server, the process that manages the interaction of all telephony system processes, for example, starting and stopping text-to-speech or speech recognition sessions.
A system of managing the execution of a process. A process manager operates the defined and agreed process, ensuring that it interfaces with all other relevant processes, target setting, process audits, effectiveness and efficiency reviews, and managing the process improvement cycle.
A representation of a real-time business process. A business process model is composed of the individual steps or activities that make up the process, contains the conditions that dictate when the steps or activities occur, and identifies the resources that are required to run the business process.
The logical representation of a Java process. A process object is identified both by name and a process ID number (PID), and appears in the Monitors view along with the associated agents whenever a Java process is launched or attached to.
- A Java function that accepts arguments as input. It operates on the value of the component to which it is connected when it is rendered, or to subcomponents being assembled into the component for rendering.
- A device for processing data from programmed instructions. It may be part of another unit.
- One or more integrated circuits that process coded instructions and perform a task.
- In a computer, the part that interprets and executes instructions. Two typical components of a processor are a control unit and an arithmetic logic unit.
processor status word
See program status word.
See central storage.
processor value unit (PVU)
A unit of measure that is assigned to each processor core for software licensing purposes. PVUs vary according to chip architecture. See also core, full-capacity, subcapacity.
A structured collection of activities and tasks that can be reused for specific process workflows. Process templates can be edited, created, cloned, and removed. Users typically apply and modify a process template when they design a workflow for a specific process.
The category to which a process belongs. All the activities in a process inherit the same process-type attribute. Categorizing processes makes it easier to find a particular process or activity - the BTS browsing commands allow filtering by process-type.
See procedure library.
A defined role in WebSphere Commerce that uses the account belonging to the buyer organization to make purchases from the seller and sends pending orders to the procurement system for approval.
procurement buyer administrator
A defined role in WebSphere Commerce that registers and approves users as procurement buyers (buy-side). The procurement buyer administrator manages the various users and creates and administers the suborganizations within the buying organization.
See purchasing card.
procurement purchase order
A type of procurement order for which a purchase order is derived for the purpose of replenishing inventory by purchasing it from a node or supplier that is not owned by the seller organization.
procurement transfer order
A type of procurement order for which a transfer order is derived for the purpose of replenishing inventory by moving it from another node owned by the seller organization to the shipping node location. See also transfer order.
PRO data model
See Public Record Office data model.
- An entity that transmits data to another entity. For example, a join thread that receives data from a scan thread is considered a consumer; in this case the scan thread is considered a producer.
- An application that creates and sends messages. See also message producer, publisher.
- An individual or organization who sells the products of an insurance carrier.
A set of interfaces that are defined for the producer portal. The producer definition can include the producer service description, the producer portal URL, and the security setup. See also consumer portal, producer portal.
A portal that provides portlets as a service so that other portals, called consumer portals, can use the portlets and make the portlets available to their users. See also consumer portal, producer definition.
- Something produced that is marketed or sold. A product is formed from a particular configuration of component parts, which can be software applications, physical parts, or services. A complex product might contain multiple systems. A system might be made up of multiple products. See also product line, system, variant.
- A wireless device used for communication such as a cell phone, a calling card, or a tablet.
- In System Manager, a program or application that is identified as a product to the i5/OS operating system by a product identifier and a product definition.
- A single item or a family of similar items sold to a customer. See also stock keeping unit.
- A catalog entity that can be viewed as a group of items that share attributes. All items that are related to a particular product exhibit the same set of attributes and are distinguished by their attribute values.
- A separately sold software application that might contain other products that are sold separately. A product has its own product identifier (PID).
The three-character code that uniquely identifies a warehouse enablement pack and keeps the data and schema of one warehouse enablement pack separate from other warehouse enablement packs.
In System Manager, an object that contains the information about a product. The object type is *PRDDFN. A product definition is identified as belonging to a product (PRDID) and a release (RLS). A given product and release can have only one product definition.
product exploration metaphor
A metaphor in which customers initiate a parametric search of the product data. This metaphor is intended for customers who are familiar with the features of a given category of products.
See product line.
See product identifier.
product information management (PIM)
The process of collecting, adding, updating, and maintaining product information in a central repository in order to provide consistent, accurate, and current product information to other systems or outputs, such as websites or catalogs.
In OSI, a part of the formal notation used to specify ASN.1, in which allowed sequences of items are associated with a name that can be used to refer to those sequences in the definition of new sets of allowed sequences.
In cross-site mirroring, the independent disk pool to which all production operations are directed. All disk write operations are directed here first and are then replicated to the mirror copy of the independent disk pool. The production copy always has current data.
A database in which Sterling Control Center records the information gathered from the monitored servers for historical purposes (for example, ad hoc select statistics and user reports).
An environment that includes instances of the enterprise system and the mobile application platform. Mobile apps are distributed to devices in an enterprise on a product environment.
- A subset of the preproduction library of app testing features that customers use. Customers' mobile devices report issues and problems anonymously. These features also collect fewer details in logs, session data, and crash reports. See also production mode.
- A library containing objects needed for normal processing. See also test library.
- One of two modes in which the IBM Watson system can be run. The system can be run in production mode after it has been adapted to a domain, trained, and tested, and is ready to respond to user queries. See also customization mode.
- An operating state where customers use a limited set of data-collection features to provide information regarding an app's behavior and performance. See also production library.
A plan that contains all job scheduling activity planned for a period. The plan is created or extended by the Jnextplan job or by planman. It is stored in the Symphony file, and consists of all the jobs, job streams, and dependency objects that are scheduled to run for that period, including any jobs or job streams carried forward from the previous plan. See also final job stream, production period.
Data that is ready to be published from a staging server or an authoring server to a production server. See also authoring server, commit, production server, quick publish, staging server, task group, workspace task group approver.
- A WebSphere Voice Response system that is used to respond to or make 'live' calls. A production system can also be used to develop new applications. See also development system.
- A system on which application programs that are already developed and tested run on a regular basis.
A group of closely related products that are variants of each other. Products that make up a product line are often produced from a common base or architecture. See also product, system, variant, variation point.
product line engineering (PLE)
A method for designing and developing a line of products that are based on common components with variations in features and functions to provide a diverse product line efficiently at a reduced development cost.
- The smallest logical collection of objects that can make a product option.
- In System Manager, an object that contains the control information about an option. The object type is *PRODLOD. A product load is identified by the product identifier (PRDID), release (RLS), option (OPTION), and load identifier (LODID) parameters.
A defined role in WebSphere Commerce that is responsible for determining the best way to display, price, and sell products in the online store. The product manager role is equivalent to a merchandising manager.
product-sensitive programming interface (PSPI)
A special interface that is intended to be used only for a specialized task, such as diagnosis, modification, monitoring, repairing, tailoring, or tuning.
The operating systems, subsystems, or products that can be installed, maintained, and migrated as a group. See also software instance.
Professional Office Systems (PROFS)
See OfficeVision Series.
- An object that contains information about the characteristics of the user's session.
- In the Remote System Explorer, a container for a particular user's filter, connection, IBM i command, and user-defined action information. A profile can also be used to partition data if the number of remote server connections is high.
- In security, a description of the characteristics of an entity to which access is controlled.
- Data that describes the characteristics of a user, group, resource, program, device, or remote location. See also data set profile, discrete profile, general resource profile, generic profile, user profile.
- A combination protocols and bindings that are used together to create a federation and enable single sign-on.
- In social software, a user account where all of the user's information is displayed.
- A description of the control available to a particular network operator.
- A set of requirements (description, competency, responsibilities, experience, and so on) common across one or more positions.
- In Sterling Order Management, a set of data that lists significant features of items that are sold in stores.
- A file containing customized settings for a system or user.
- An XML-formatted file that contains a set of runtime properties for a given domain of activity, such as user or TCP/IP.
- The internal resume of an employee that can include education, experience, languages, mobility, and performance goals.
- In CICS, a set of options specified in a resource definition that can be invoked by a transaction definition. Profiles control the interactions between the transaction and terminals or logical units.
- A named group of configuration information that can be distributed from a configuration manager when a managed server subscribes. Configuration information can include registered administrator IDs, policies, client schedules, client option sets, administrative schedules, storage manager command scripts, server definitions, and server group definitions. See also configuration manager, enterprise configuration, managed server.
- A set of attributes, such as skills and competencies that serves as a template for project profiles.
- A container for application-specific information about a particular type of resource. A Tivoli application specifies the template for its profiles, which includes information about the resources that the Tivoli application can manage.
- A set of parameters that vary the way an application behaves. A profile feeds values into builders based on user identity or other contextual information, such as language. Using profiles, different variations of an application or portlet can be automatically generated (from the same model) for different users, customers, or situations.
- A set of behaviors, privileges, or capabilities that determine how database objects interact with resources.
On a configuration manager, the defined relationship between a profile and an object such as a policy domain. Profile associations define the configuration information that is distributed to a managed server when it subscribes to the profile.
A two-stage compilation process that first compiles and runs a program to analyze its behavior and then recompiles the program to optimize its execution. The results of the analysis stage are saved in a profile data file that is input to the second, optimization stage.
- In DCE Remote Procedure Call (RPC), a record in an RPC profile that maps an RPC interface identifier to a profile member (a server entry, group, or profile in a name service database).
- An element or monitoring task belonging to a user profile. The element defines what is to be monitored and when.
In VM, a special EXEC procedure with a filename of PROFILE. The procedure is normally executed immediately after CMS is loaded into a virtual machine. It contains CP and CMS commands that are to be issued at the start of every terminal session.
A value created by the system from the Get Profile Handle API that is used to identify a valid user ID and password. This value is used as input to switch the controlling user profile in a job to another user profile without changing the name of the job.
- See computer group.
- In a Tivoli environment, a container for profiles that links the profiles to a set of resources, called subscribers. Tivoli administrators use profile managers to organize and distribute profiles. A profile manager can operate in the dataless mode or database mode.
The ability for a user or an installation to copy information (such as universal access authority or access lists) from an existing resource profile when defining a new resource profile.
An analysis of visitors using selected criteria. The analysis can span sessions through the specification of a segment date range and a report date range. For example, users can analyze the pages that were viewed in April by visitors who came at least twice in March.
A collection of profiles. For example, a profile set called Country would contain profiles for several countries where business is conducted (France, Spain, Germany, or USA, for example). One profile set can be applied to more than one model.
- The display of non-aggregated respondent data, that is, a list of the responses given to questions by individual respondents.
- A performance analysis process that is based on statistics for the resources that are used by a program or application.
The ratio of profitability. It indicates how much a company actually gets to keep in terms of earnings from every dollar it earns through sales. Profit margin is displayed as a percentage, for example, a 20% profit margin means the company has a net income of $0.20 for each dollar it earns through sales.
- See accrual invoice.
- A draft invoice that is created upon shipment creation that charges and taxes can be persisted against.
See Professional Office Systems.
See VM/MVS bridge.
See program identifier.
- To design, write, and test computer programs.
- A file containing a set of instructions that conform to a particular programming language syntax.
- A large transformation consisting of multiple projects crossing organizational boundaries. Individual projects are managed by their own PDT and IPMT, but are interlocked with the program PDT and IPMT.
- A single, compilable collection of executable statements in a programming language.
- In the Integrated Language Environment (ILE) model, the executable object that results from binding modules together.
- A prepared sequence of instructions to the system to accomplish a defined task. In POSIX.2, a program encompasses applications written in the shell command language, complex utility input languages, and high-level languages (HLLs).
- A sequence of instructions that a computer can interpret and run without a user's intervention.
- A group of related projects managed in a coordinated way. Programs usually include an element of ongoing activity.
program access to data sets
A RACF function that enables an authorized user or group of users to access one or more data sets at a specified access authority only while running a specified RACF-controlled program. See also program control.
program automatic storage area (PASA)
A system object that contains call level information for each program on the call stack. The PASA can also contain space (allocated when the program object is called) for program variables.
- A call made to an ILE program or to an OPM program. See also procedure call.
- A call to an IBM i program or service program procedure.
Program Call Markup Language (PCML)
A tag language that is used to describe the input and output parameters for programs running on System i models. PCML is based on the Extensible Markup Language (XML). PCML files are used with the ProgramCallDocument class in the IBM Toolbox for Java to automate parameter handling and calls of ILE programs from Java.
program communication block (PCB)
A control block that contains pointers to Information Management System (IMS) databases. See also program specification block.
An operation performed by program control to relieve space in the DSA during a short-on-storage condition. The list of program definitions is searched to identify programs that have been dynamically loaded and are currently not in use. If a program is not in use, the space it occupied is reclaimed. See also short-on-storage.
- An RACF function with which an installation can control who runs RACF-controlled programs. See also program access to data sets.
- A CICS facility that handles the flow of control among application programs.
program control table (PCT)
A CICS table defining the transactions that can be processed by the system. Each transaction is paired with the name of the program that CICS runs when the transaction is called.
See instruction address register.
Application-specific data that can be associated with a call transfer from Callpath to DirectTalk, or in the opposite direction. This is equivalent to Callpath program data, but DirectTalk imposes the restriction that the data must be a printable ASCII character string, with a maximum length of 512 bytes.
Data contained in a file for which the fields in the records are described in the program that processes the file. See also externally described file.
A file for which the fields in the records are described only in the programs that process the file. To the operating system, the record appears as a character string. See also externally described file.
Program Development Facility (PDF)
An IBM licensed program used with the Interactive System Productivity Facility (ISPF) to provide a work environment for the development of programs and the use of functions, such as edit and browse.
A symbolic device that a program uses instead of a real device (identified by the device name). When the program uses a program device, the system redirects the operation to the appropriate real device.
program entry procedure (PEP)
A procedure provided by the compiler that is the entry point for an ILE program on a dynamic program call. See also user entry procedure.
program error program (PEP)
A user-replaceable program containing code to obtain program addressability, access the COMMAREA, and return control to the CICS abnormal condition program (DFHACP) through an EXEC CICS RETURN command.
- See function key.
- A key on a computer that can be programmed to perform a particular operation.
A 1- to 8-character string entered from a finance device and associated with a server finance transaction program. Lists of valid program IDs and their associated application programs are maintained in program tables.
program identification entry
In COBOL, an entry in the PROGRAM-ID paragraph of the Identification Division that contains clauses that specify the program-name and assign selected program attributes to the program.
program isolation (PI)
A DL/I or IMS facility that separates all the activity of an application program from any other active application program until that application program indicates, via a synchronization point, that the data it has modified or created is consistent and complete.
program isolation lock manager
A facility for local locking in systems for which no internal resource lock manager (IRLM) has been defined. Otherwise, the IRLM is used for all lock management, including local lock management.
- Pertaining to an operation that is performed for an entire program. See also command-level.
- The version of a program that is composed of the following levels: the version number, the release number, the modification number, and the fix number.
A type of partitioned data set extended (PDSE) that contains program objects only. A program library is a PDSE from which programs are loaded into memory for execution by the operating system.
program list table (PLT)
A CICS control table that contains a list of programs that can run as a group during CICS startup or shutdown and can be enabled and disabled as a group by a single CEMT transaction.
programmable command format (PCF)
A type of WebSphere MQ message used by the following applications: user administration applications, to put PCF commands onto the system command input queue of a specified queue manager, user administration applications, to get the results of a PCF command from a specified queue manager, and a queue manager, as a notification that an event has occurred. See also WebSphere MQ script commands.
- The task of preparing programs for execution, storing the load modules or program objects in program libraries, and executing them on the operating system.
- The functions within the system that establish the necessary activation and invocation for a program so that it can run when it is called.
program manager domain
A CICS domain that provides support for the following: program control functions; transaction ABEND and condition handling; related functions such as invoking user-replaceable modules, global user exits, and task-related user exits; autoinstallation for programs, map sets, and partition sets.
In bits 20 through 23 of the program status word (PSW), a 4-bit structure that controls whether each of the fixed-point overflow, decimal overflow, exponent-overflow, and significance exceptions should cause a program interruption. The bits of the program mask can be manipulated to enable or disable the occurrence of a program interruption.
The process of adding algorithms into the processing pipeline and into the post-processors in the final merging and ranking phase. New algorithms are inserted as UIMA annotators and might replace existing annotators.
- A collection of methods used by applications when declarative security is not sufficient to express the security model of the application.
- Security model using Java enterprise-bean client applications that require the user to provide identifying information. The application must collect that information and authenticate the user.
programmer user profile
The system-supplied user profile that has the authority necessary for system and application programmers and the special authorities of save system authority and job control authority. Named QPGMR.
Programming Development Manager (PDM)
An application that is used in a 5250 emulator to query an IBM i host and perform actions against objects. See also 5250 display.
programming interface for customers
The supported method through which customer programs request software services. The programming interface consists of a set of callable services provided with a product.
- A customer request for a price quotation for a licensed program to be designed especially for a particular group of customers or an application. Documentation for the program is provided only to those customers who order the PRPQ. See also request for price quotation.
- A customer request for a price quotation on alterations or additions to the functional capabilities of system control programming or licensed programs. The PRPQ may be used in conjunction with computing system RPQs to solve unique data processing problems. See also computing system RPQ.
See programming request for price quotation.
program module attribute
A characteristic of a program module that is stored in directory entry of a program module. The program module attribute controls the loading rebinding and other processing of the module.
- All or part of a computer program in a form suitable for loading into virtual storage for execution. Program objects are stored in partitioned data set extended (PDSE) program libraries and have fewer restrictions than load modules. Program objects are produced by the binder.
- One of two machine object classifications. It includes those objects used in programs that get their definition from an object definition table. Program objects are used as the parameter or values of machine instructions. See also system object.
The process of producing a program. The process includes precompilation, compilation, and bind. See also prepare.
program resolution monitor (PRM)
In the original program model (OPM), a program that translates the intermediate representation of a program into the machine language for use by the computer. The program resolution monitor is used by the programming language compilers to complete the translation of a source program into machine language instructions.
program specification block (PSB)
In DL/I and IMS, a control block that describes the databases and logical message destinations that are used by an application program. A PSB consists of one or more program communication blocks (PCBs). See also program communication block.
program static storage area (PSSA)
A system object that contains static variable data for programs on the call stack. The PSSA contains space for program variables that is activated when the program object is activated. The PSSA is contained in the process access group (PAG).
program structure view
A display of the nodes in the Application Diagram which represent programs and service programs. For ILE programs and service programs the nodes contain a list of the bound modules. The connections in a Program Structure Diagram represent binding relationships between objects.
A list of the i5/OS finance applications for use in an i5/OS finance job. Each table entry consists of a program ID and the program name and library associated with that ID. Program IDs received in data streams from finance devices are located in the program table to determine the i5/OS application that should be called.
program temporary fix (PTF)
For System i, System p, and System z products, a package containing individual or multiple fixes that is made available to all licensed customers. A PTF resolves defects and might provide enhancements. See also fix pack.
program-to-program message switch
An IMS output message sent by one application program to another application program. See also message switch.
- A group of statements that is considered as a whole. Typically an OPL script file loaded by the application is treated as a program unit.
- See compilation unit.
- In Ada programming, a discrete unit that performs a specific task or set of tasks. Program units are subroutines and calling programs that are assembled separately and then linked to make a complete program.
program update tape (PUT)
A code release to Transaction Processing Facility customers containing maintenance (program fixes) and new function. See also Transaction Processing Facility.
The user interface design methodology that limits the amount of information that is presented to the user to what is necessary or required at any given time, so that the user has less information with which to initially interact but can access additional information.
A method of retrieving a LOB or an XML value from a database server in the most optimal manner by using Dynamic Data Format. See also Dynamic Data Format.
- A specific organization of rules and other elements that facilitates the authoring and management of a logical grouping of rules.
- A framework for holding the data and metadata that refers to an XBRL instance document.
- A unique process, consisting of a set of coordinated and controlled activities with start and finish dates, undertaken to achieve an objective conforming to specific requirements, including the constraints of time, cost, and resources.
- An object that contains configuration information, activities, and policies required to manage a development effort.
- A container that differentiates search applications by the specific sources, search collections, displays, and other components it uses.
- An object that includes a database, documents, document types, requirements and their attributes, requirement types, requirement traceability, discussions, and user and group security.
- In Metric Designer, a group of extracts. Each extract contains the metadata that is used to populate the Metric Studio data store or to create applications.
- A collection of multiple tasks and milestones.
- A survey and all of its associated files and actions.
- In Metric Studio, a task or set of tasks undertaken by a team and monitored on a scorecard. A project tracks dates, resources, and status.
- A planned set of interrelated tasks to be executed over a fixed period and within a certain cost and other limitations.
- In InfoSphere Streams Studio, a logical container for the artifacts of toolkits and streams processing applications.
- The development environment for various components, such as applications, adapters, configuration files, custom Java code, and libraries.
- A group of files that are related to a data mining task. Projects can include items such as data streams, graphs, models, reports, and objects from other sources such as a document or slide show presentation.
- A self-contained data set in a data file that can be opened in the application, containing data on multiple scenarios.
- A container that organizes and provides security for objects that are supplied, created, or maintained for data integration, data profiling, quality monitoring, and so on.
- In Eclipse, a unit of organization used to group folders or packages. Projects are used for building, version management, sharing, and organizing resources.
- A temporary endeavor or initiative created and managed to achieve an organization's objectives.
- In Framework Manager, a set of models, packages, and related information for administration, and for sharing model information.
- The association of a model and a set of data files.
- An executable definition of work that is made up of steps. Its behavior is controlled through project properties and has an associated selector that determines what server (or servers) it can be run on. A project can be assigned its own environment.
- An organized collection used to group folders or packages. Projects are used for building, version management, sharing, and organizing resources related to a single work effort. See also library, module.
A calendar selected from the base calendars and associated to a project during project creation. The project calendar is the reference for all time-based aspects of the project, including the schedule, timesheets, and resource allocation. The project calendar includes all the information of the base calendar, and it can be further customized to meet project-specific requirements, such as adding additional non-working days. See also base calendar.
- A technical and business team commissioned by a sponsoring IPMT to execute the solution development cycle for a new offering. See also Integrated Portfolio Management Team.
- A multi-functional team with the responsibility for responding to an IPMT-provided set of prioritized customer requirements. The PDT is responsible for defining, developing, qualifying, marketing, delivering and supporting an offering over its life cycle. The PDT may include worldwide representatives from business planning, production, marketing, service, development, programming, project management and others as appropriate. The PDT interacts with the IPMT primarily through the structured Decision Checkpoint (DCP) activities.
A specific unit of function that can be added to a project when that functionality is required. When a facet is added to a project, it can add natures, builders, classpath entries, and resources to a project, depending on the characteristics of the particular project. See also facet.
- A type of Rational DOORS user who can perform a limited set of management tasks.
- The role with overall responsibility for the project. The project manager needs to ensure tasks are scheduled, allocated and completed in accordance with project schedules, budgets and quantity requirements.
A lock that can be changed from a shared lock to an exclusive lock. See also update lock.
- In application development, to move a part up one level in the project hierarchy.
- To pay to have content show up at the top of search results.
- In ILE, to convert an unhandled exception into a new exception with a different meaning. The new exception is passed on to the next exception handler.
- To copy replication definitions for subscription sets or registered sources from one database to another database, without registering the sources again or creating the subscription sets again.
- To change a condition to a different one using a condition handler. A condition handler routine promotes a condition because the error needs to be handled in a way other than that suggested by the original condition.
- To move an object forward to a later state or version, for example, to promote a minor version into a major version and set its status to "released." Promotion sets the previous status of the major version to "superseded."
- To add a logical data unit to cache memory.
- The process of one host taking over level functions for another. See also demotion, level function.
- In JavaBeans technology, the process of making features of a contained bean available to be used for making connections. For example, if a bean consisting of three push buttons on a panel is placed in a frame, the features of the push buttons have to be promoted to make them available from within the frame.
- The process of creating an authorized configuration item from an actual configuration item.
- A mechanism for moving binaries, source code, source code data, build maps, output, Partitioned Data Sets (PDS) on z/OS or libraries on IBM i, and other build artifacts up the development-test-production hierarchy on a z/OS or IBM i system.
- Business logic that offers incentives to customers when certain conditions have been satisfied.
A transient object that only exists when the promotion engine is called to evaluate whether promotions are applicable to an order. It captures the state of the promotion engine during the process.
A template containing a mapping of classifications between actual configuration items (CIs) and the corresponding authorized CIs, used to promote an actual CI in order to create an authorized CI.
- A component of an action that indicates that user input is required for a field before making a transition to an output screen.
- A program that uses logic to determine dynamically the voice segments to be played as a voice prompt.
- A message or a displayed symbol that requests information or user action. The user must respond to allow the program to proceed.
- A report element that asks for parameter values before the report is run.
A dependency where an operator must respond affirmatively to a prompt so that the dependent job or job stream can run. See also ad hoc prompt dependency, predefined prompt dependency.
A tracking number assigned by a carrier used to track a shipment (usually for Less than Truckload (LTL) shipments) through the carrier's transportation process. See also tracking number.
See programmable operator facility.
- The point at which the properties of a type are inherited by its subtypes.
- A process in which order attributes are applied to the shipment that contains the orders. Propagation is also used to assign shipment attributes to the orders in the shipment.
- In architecture, a method used to retain a segment's properties through other segments that it calls.
- A process in which groups of configuration parameters are updated and take effect at different rates.
Within a studio, a pane that provides an overview of the properties for selected data. The properties pane can also be used to make several changes and apply them at the same time, instead of repeating several different commands.
- A characteristic of an entity that consists of a parameter and its value and that is used by the application, such as the configuration properties in the common.properties file, or by the application object that can accept property settings.
- A characteristic or attribute that describes a unit of information.
- A descriptive element used as the basic entity for rule creation. Properties are associated with models, option classes, and option items.
- Public information (that is, information available to any client) that is associated with a window.
- In the Common Information Model (CIM), an attribute that is used to characterize instances of a class.
- A characteristic of an object that describes the object. A property can be changed. Properties describe an object name, type, value, or behavior, among other things. See also custom property, property tag, property template.
- A container for a single piece of information about an item.
A WebSphere Portal interface that negotiates the relationship between cooperative source and target portlets and delivers data to the target in the form of the corresponding portlet action. See also cooperative portlets.
- A piece of information about an item that comprises related properties. For example, a distinguishing feature of a person comprises information about the type, appearance, and location of the distinguishing feature.
- In zIDE, a named set of build properties that can be used to define and save multiple build configurations for a project, subproject, or file.
A property available through the Workflow tab on the properties sheet for an event subscription. This identifies the workflow data fields designated as launch step parameters in the workflow definition.
See tabbed page.
property semantic type
A semantic type that can be assigned to a property type, a property in a data record, or an attribute class. See also semantic type.
A shorthand way to identify a component by a keyword. See also property.
proportionally spaced font
A font in which the character increment for each graphic character varies. Proportionally spaced fonts provide the appearance of even spacing between presented characters and eliminate excess blank space around narrow characters, such as the letter i. See also fixed-space font, uniformly spaced font.
- The spacing of characters according to their relative width.
- The spacing of characters in a printed line so that each character is allotted a space based on the character's width defined in a given font. See also monospacing.
- A document generated from a quote that is typically presented to a customer. A proposal contains the details of a quote such as the line items, quote total, adjustments, and so on.
- An item that suggests a change to an object in a module.
- A collection of protocols that the initiating and responding key servers use to establish a dynamic virtual private network (VPN) connection between two endpoints.
See protected logical unit of work.
See protected logical unit of work identifier.
In APPC, a string of bytes that is substituted for a user password. The protected password is sent instead of the user password and can be used to verify the identity of the user but only under specific and controlled circumstances. The LU type 6.2 architecture refers to the protected password as a password substitute.
- A resource that is updated in a synchronized manner during resource recovery processing.
- A resource that is updated only in accordance with the two-phase commit process.
- A resource for which there is either a RACF profile or a RACF option which is controlling access.
protected-resource manager (PRM)
See protection manager.
See primary site.
- The part of the auxiliary storage pool (ASP) that is reserved for the creation of permanent objects, such as libraries and files, when checksum protection is in effect.
- All auxiliary storage in an auxiliary storage pool (ASP) when mirrored protection is in effect.
protected user ID
See protected user identifier.
protected user identifier (protected user ID)
A user ID that cannot enter the system by any means that requires a password or password phrase, and cannot be revoked by incorrect password and password phrase attempts.
In iSeries, a disk storage device that is protected from data loss by the use of a Redundant Array of Independent Disks (RAID). An iSeries host does not mirror a volume configured as a protected volume, while it does mirror all volumes configured as unprotected volumes. The ESS, however, can be configured to indicate that an iSeries volume is protected or unprotected and provide it with RAID protection in either case.
An indicator that appears in the current program status word whenever an associated task has control of the system. This indicator must match the storage keys of all main storage blocks that the task is to use.
A system component, associated with one or more protected resources, that interacts with sync point services to carry out two-phase commit protocols. A protection manager implements the parts of the protocol that are specific to a particular resource type. Two types of protection managers are defined: conversational resource protection managers and local (nonconversational) resource protection managers. Together, these resource protection managers are referred to as protected-resource managers.
- A set of rules controlling the communication and transfer of data between two or more devices or systems in a communication network. See also bracket protocol, link protocol.
- In OSI, a specification of the format and relative timing of information exchanged between peer entities within a layer.
Protocol Analysis Module (PAM)
A deep-pack inspection engine that stores handling specifications for a comprehensive list of vulnerability checks. PAM interprets the vulnerability checks, processes the results as security events, and then sends the security events to the appliance in X-Press Updates.
- In OSI, a unit of data exchanged between peer entities.
- A unit of data that is specified in a protocol of a given layer, and that consists of protocol control information of this layer, and possibly user data of this layer.
- A unit of data exchanged between peer systems.
See address family.
A service that receives and sends messages in specific communication protocols, such as HTTP and HTTPs. The protocol handler calls data handlers to extract the data that is contained in the messages.
protocol-level RAS granularity
The level of RAS granularity at which RAS attribute values are assigned on a protocol-wide basis. RAS attribute values defined at the protocol-level are assigned to all requests for a particular protocol, such as the HTTP protocol or IIOP protocol. See also RAS granularity.
protocol-specific MPTN manager (PMM)
A component of the MPTN architecture that performs management, routing, and binding functions that are performed differently for the different transport providers.
One of the system development approaches that enables users and developers to study and confirm system requirements and design at an earlier stage of development by producing mockups, demonstrations, or software that significantly resembles the proposed system, but is not yet fully developed.
A COM component with an OLE DB interface that exposes case data to the consumer by representing the data as a virtual table, which is populated by using data from a database or a proprietary data file. Data is exposed to the Provider by using a case data source component (CDSC).
provider registry endpoint
A predefined HTTP endpoint that is used for discovery of service providers in the OSLC provider through the provider registry. See also endpoint.
- To add a subscription for a service to a user account, most often in the context of SmartCloud Notes.
- To provide, deploy, and track a service, component, application, or resource. See also deprovision.
- The process of making computing resources available to users.
- The process of configuring servers, software, networks, and storage resources.
A group of related computers. An administrator can create provisioning groups to organize systems into meaningful categories, and to facilitate deployment of software to multiple computers.
A policy that defines the access to various managed resources, such as applications or operating systems. Access is granted to all users, users with a specific role, or users who are not members of a specific role.
A reserved application that is set up for a specific business requirement and is made available to a user. Users with restricted access in the data center model can subscribe to provisioning services that they require.
A ticket that allows a key distribution center (KDC) server to issue a service ticket for a specific task or tasks on a network or for an IP address that is different from the address in the original ticket granting ticket (TGT).
- A text search that returns a result when two search patterns occur within a specified distance from each other.
- A search that seeks to locate either vacancies or candidates based on their location. For example, a candidate who does not wish to relocate or travel far to work may search for vacancies in a 5-mile radius of where they live.
- An application gateway from one network to another for a specific network application such as Telnet or FTP, for example, where a firewall proxy Telnet server performs authentication of the user and then lets the traffic flow through the proxy as if it were not there. Function is performed in the firewall and not in the client workstation, causing more load in the firewall.
- An application programming interface that forwards requests to a user-defined backend resource and relays responses back to the calling application.
A process or entity that is both an agent to its manager and a manager for one or more objects. It satisfies requests from its manager by relaying those requests and translating them for the objects that it manages.
- A server that receives requests intended for another server and that acts on behalf of the client (as the client's proxy) to obtain the requested service. A proxy server is often used when the client and the server are incompatible for direct connection. For example, the client is unable to meet the security authentication requirements of the server but should be permitted some services.
- A server that acts as an intermediary for HTTP Web requests that are hosted by an application or a web server. A proxy server acts as a surrogate for the content servers in the enterprise.
A store that represents a business partner's operational assets and handles the business logic that allows a WebSphere Commerce site to interact with an external business partner. A proxy store does not include a storefront and cannot be accessed by users. See also distributor proxy store.
See programming request for price quotation.
See production readiness review.
See Processor Resource/Systems Manager.
See private trailer.
- In data replication, the process of removing obsolete data from objects such as control tables, staging tables, or queues.
- In GL, eliminating the drawing of parts of the display list because a bounding box test shows that they are not visible.
See prefixed save area.
See Print Services Access Facility.
See presentation-layer service access point.
See program specification block.
PSB directory (PDIR)
A list or directory of program specification blocks (PSBs) that define the use of databases by application programs for DL/I. It contains one entry for each PSB to be used during CICS execution, and is loaded during initialization.
See program specification block generation.
See Personal System Communications Adapter.
See power system control network.
See presentation services command processor.
See presentation-layer service data unit.
An attribute that cannot have a value, and is used to indicate a binary state, such as yes/no or on/off. For example, the attribute local might be present for some resources and absent for others, indicating whether the resource is local. Pseudo attributes are especially useful for implementing access rights, such as read, update, or delete. See also real attribute.
In REXX, a variable used in CL commands, whose name conforms to the CL programming rules for variables but actually refers to a REXX variable. The name must begin with an ampersand, but it is stripped off when determining the name of the actual REXX variable that is to be used. Pseudo-CL variables must be valid REXX variable names and valid CL variable names.
In Enhanced X-Windows, a class of color map in which a pixel value indexes the color map entry to produce independent red, green, and blue values. The color map is viewed as an array of triples (RGB values) that can be changed dynamically, and is mutually exclusive to the direct color map class.
In BTS, property of a task can be reattached ("reactivated") when a predefined event occurs, in order to take the next in a set of processing steps. See also activation.
A cost for binary (0-1) variables. A pseudocost offers the same facilities in branch and bound or branch and cut for binary variables as cost does for continuous variables. See also cost function.
Pertaining to a key that is marked as deleted but has not yet been physically removed from the index page. See also pseudoempty.
Pertaining to an index page on which all the keys are marked as pseudo deleted. See also pseudodeleted.
An IMS in a multisystem environment in which all terminals are handled and a small number of time-consuming transactions are routed to a transaction processing system. See also front-end system, transaction processing system.
A host connection that is not explicitly defined to the ESS and that has access to at least one volume that is configured on the ESS. For example, the FiconNet pseudo-host icon represents the FICON protocol. See also access-any mode, EsconNet, FiconNet.
In the Integration Flow Designer, dotted lines manually drawn in a system definition diagram that visually represent a data flow relationship between two map components that has not yet been determined precisely.
A set of shelf-resident optical volumes associated with stand-alone, operator-accessible, or both stand-alone and operator-accessible optical disk drives. See also real optical library.
A token consisting of eight decimal characters, which can be used in place of the recovery token in certain circumstances. For example, a pseudorecovery token is displayed when the status of an application thread is in-doubt. It is made shorter so that it is easier to note and enter, for example, in certain DBCTL commands. See also recovery token.
A special file in the /dev directory that effectively functions as a keyboard and a display device for software that uses the Berkeley line discipline. A pseudo terminal consists of a pair of character devices: a) the slave device (/dev/pts), and b) the master device (/dev/ptc).
In COBOL, a sequence of character-strings and/or separators bounded by, but not including, pseudo-text delimiters. Pseudo-text is used in the COPY REPLACING statement for replacing text strings.
See Print Services Facility.
- In PSF/VSE, the program that writes spooled output files from an output queue to an external device, such as a printer.
- In PSF/VSE, the program that receives output data from the host system.
See physical services header.
See partitioned secondary index.
See Parallel Sysplex license charge.
See Printing Systems Manager.
See Proportional Spacing Machine font.
See product-sensitive programming interface.
See page set recovery pending.
See programmable store system.
See program static storage area.
See public switched telephone network.
See power supply unit.
See program status word.
See physical terminal.
See program temporary fix.
A single, orderable PTF (program temporary fix or simply, fix) that provides a logical set of PTFs for a specific function such as database or Java. PTF groups are dynamically updated when new PTFs for the same function become available.
See Peer-to-Peer VTS data.
See Peer-to-Peer VTS mode control.
See Peer-to-Peer Virtual Tape Server.
See physical unit.
- In object-oriented programming, pertaining to a class member that is accessible to all classes.
- In the Java programming language, pertains to a method or variable that can be accessed by elements residing in other classes. (Sun)
Public Address Book
See Domino directory.
An alias defined in the SYSPUBLIC schema that can always be referenced by its unqualified name without any impact from the current default schema name. See also alias.
In event publishing, an object that identifies what changes are published from a source table to a user application. The Q Capture program publishes changes from a source table and puts those changes on a send queue in XML or delimited format. See also Q subscription, replication source.
- The authority for an object granted to all users.
- The authority given to users who do not have any specific (private) authority to an object, who are not on the authorization list (if one is specified for the object), and whose group profile has no specific authority to the object. See also owner authority, primary group authority, private authority.
- A network operated by a government or private organization to provide computer communications to the public, usually for a fee. With a PDN, a small organization can create a WAN without incurring the equipment costs of long-distance circuits.
- A communications common carrier network that provides data communications services over switched or nonswitched lines.
In UNIX-based operating systems, a directory that can be used by anyone on the system. Typically /tmp and /usr/tmp are public directories used for temporary file storage. The UUCP system provides a public directory named /usr/spool/uucppublic, where users from remote systems can deposit files.
- The names of procedures and data items, exported from an ILE service program, that can be accessed by Integrated Language Environment (ILE) programs or other service programs.
- The network interface connected to the public network.
- The non-secret half of a cryptographic key pair that is used with a public key algorithm. The public key is made available to everyone. Public keys are typically used to verify digital signatures and to encrypt data that can be decrypted only with the corresponding private key. See also private key, public key infrastructure.
- In secure communication, an algorithmic pattern used to decrypt messages that were encrypted by the corresponding private key. A public key is also used to encrypt messages that can be decrypted only by the corresponding private key. Users broadcast their public keys to everyone with whom they must exchange encrypted messages. See also key, private key.
- An encryption key associated with a Notes ID that is used to verify an electronic signature, encrypt a message, or identify an authenticating user. A public key is part of each user ID, and a copy of the key is stored in the Domino Directory. Certificates on IDs ensure that public keys are valid.
public key algorithm (PKA)
An algorithm designed so that the key used for encryption is different from the key used for decryption. The decryption key cannot be derived, at least not in any reasonable amount of time, from the encryption key.
public key certificate
A unique electronic stamp stored in a Notes or Domino ID file that associates a name with a public key. Certificates permit users and servers to access specific Domino servers. An ID can have many certificates.
public key cryptography
A cryptography system that uses two keys: a public key known to everyone and a private or secret key known only to the recipient of the message. The public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. See also private key cryptography.
Public Key Cryptography Standards (PKCS)
A set of industry-standard protocols used for secure information exchange on the Internet. Domino Certificate Authority and Server Certificate Administration applications can accept certificates in PKCS format.
public key exponent
One of the two components of an RSA public key. By convention, it is normally set to either a value of 3 or 65537. The combination of the public key exponent and the modulus (the other component of a public key) is mathematically derived with the corresponding RSA private key.
public key infrastructure (PKI)
A system of digital certificates, certification authorities, and other registration authorities that verify and authenticate the validity of each party involved in a network transaction. See also public key, SWIFTNet public key infrastructure.
- Generically, a network operated by common carriers or telecommunications administrators for the provision of circuit-switched, packet-switched, and nonswitched lines to the public. See also private network.
- See public data network.
public-private key cryptography
See public key cryptography.
See public alias.
The virtual local area network (VLAN) that connects the cluster nodes and management server to the site network. Applications are accessed and run on cluster nodes over the public VLAN. The public VLAN can be connected to nodes through a second Ethernet adapter in each node, or by routing to each node through the Ethernet switch.
- To send a rule to a server for storage and management.
- To send data to the Emptoris Strategic Supply Management platform for mastering.
- To make data available to another application or system. See also subscribe.
- To make a project, tasks and templates visible to the required resources.
- To make information about a specified topic available to a queue manager in a publish/subscribe system.
- In Cognos Business Intelligence, to expose information to the Cognos server so that the data can be used to create reports and other content.
- To create a read-only copy of a document in an object store. Publishing makes the publication document available to a different audience and may translate the content to a different format.
- To bind a reference to the home of an enterprise bean in a namespace.
- To make analysis results, rules, and other entities visible to a broader audience outside the scope of a project.
- To make a new portlet or web application available for use.
- In UDDI, to advertise a web service so that other businesses can find it and bind with it. Service providers publish the availability of their services through a registry.
- To make a website public, for example by putting files in a path known to the HTTP server.
- In Connections Docs, to make files available to persons who have only reader access, not editing access.
- To electronically introduce item data or data change publications to one or more trading partners, either directly or through a data pool, for the purpose of synchronizing data.
- In testing, to make a stub, test, or test results available to the required processes or team members.
- In Cognos Planning, to copy the data from Contributor or Analyst to a data store, typically so that the data can be used for reporting purposes.
- In Connections Docs, to make files available to persons who have only reader access, not editing access.
The business glossary that includes the set of categories and terms that have been approved and published as part of a configured workflow. See also development glossary.
published module object
A database object defined in a module that can be referenced from outside the module. See also module object.
- An application that makes information about a specified topic available to a broker in a publish/subscribe system. See also producer.
- In Connections Docs, to make files available to persons who have only reader access, not editing access.
publishing queue map
In event publishing, an object that contains the settings for how a Q Capture program processes transactions and identifies the WebSphere MQ queue that is used to send transactional data. See also event publishing, queue map, replication queue map.
publishing style template
A set of translation and formatting rules applied when a document is published. See also template.
A type of messaging interaction in which information, provided by publishing applications, is delivered by an infrastructure to all subscribing applications that registered to receive that type of information.
A template that determines the properties, format (such as HTML), and storage location of the publication document. The template also determines whether the publication document is replaced or versioned when it is republished. See also template.
- A network operation that initiates an action by requesting the action from a resource. See also push.
- To retrieve data from a remote data source.
In SQL replication, a configuration in which the Apply program runs on the target server. The Apply program pulls updates from the source server to apply them to the target. See also push configuration.
- In a character-based interface, a menu that emerges in a downward direction from a point or line at or near the top of the screen; for example, a menu that appears when the user selects a particular display element or points to a line in another menu by using a device such as a mouse.
- See menu.
- In AIXwindows, a type of MenuPane widget that gives the appearance of being pulled down from a MenuBar widget as the result of a user action, usually, clicking a mouse button.
A response to a push request from one organization to another. The pull response is matched to a specific pull request and made available at the pull destination specified in the push request.
A control signal within a stream that either creates boundaries within a stream of tuples (window punctuation marks) or identifies the end of a stream (final punctuation marks). See also window.
- The abnormal end of a task by task control to alleviate a short-on-storage condition.
- To permanently delete an item from a database.
- In WebSphere Commerce Payments, to remove all associated payments and credits from a batch object, treating it as if it had just been created.
- The process by which old data is removed from the system database. Purges minimize the number of unused database records to increase search efficiency and reduce the size of the required physical disk.
- In Performance Tools, a job attribute that specifies whether a job is to be marked eligible to be moved out of main storage to auxiliary storage when entering a long wait or leaving the activity level.
- To send data from a remote data source.
- To send information from a server to a client. When a server pushes content, it is the server that initiates the transaction, not a request from the client.
- The insertion of a module in a stream immediately below the stream head.
- A network operation that sends information to resources. See also pull.
- To upload or export to a server.
- To add an item to the top of a pushdown list. See also pop.
- In a window or dialog box, a rectangular control that, when clicked, immediately causes an action to be performed. Push buttons can be labeled with text, graphics, or both. The most familiar push buttons are OK and Cancel.
- A key on a telephone key pad.
In SQL replication, a configuration in which the Apply program runs on the source server or a replication server other than the target server. The Apply program pushes updates from the source server to apply them to the target. See also pull configuration.
In a federated system, the processing of fragments of a query at a data source instead of at the federated system. See also compensation.
A list that is constructed and maintained so that the next data element to be retrieved is the most recently stored. See also last-in first-out.
A message sent to a destination requesting message processing. Depending on the exchange profile used, the push request may wait for the business application to process the message, may send a pull request after the message is processed, or may not expect any response.
Pertaining to a feature that automatically distributes product updates, such as new releases, and configuration file updates, such as preferences, property groups, and remote system connections, to client workstations when they connect to a remote system. See also global configuration file, installation configuration file, system configuration file.
See program update tape.
The task of putting an item (pallet, case, single) into storage. The putaway task may be system directed in which the system selects the putaway location, or random in which an operator finds space for the item and updates the system as to which location was chosen.
See physical unit type.
See project VOB.
See processor value unit.
See Present Working Directory.
See Preboot Execution Environment.
See parallel engine.