A B C D E F G H I J K L M N O P Q R S T U V W X Y and Z Special characters and Numerics

This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.


See Remote To Local.

See Remote To Remote.

See resource allocation timeout value.


  1. See return authorization.
  2. See repeat to address.

See receive-any control element.

race condition
A condition that occurs when two or more independent tasks simultaneously attempt to access and modify the same state information. This condition can lead to inconsistent behavior of the system and is a fundamental issue in concurrent system design.

racetrack memory
A method of storing data on 3D microchips, which can hold 100 times more data than hard disk drives or traditional memory chips while using less energy.

See Resource Access Control Facility.

RACF access control module
A DB2 module that receives control from the DB2 access control authorization exit point to handle DB2 authorization checks.

RACF always call
The policy by which DFSMSdfp checks all data sets automatically for discrete or generic Resource Access Control Facility (RACF) profiles to verify access authority.

RACF authorization
The facility for checking a user's level of access to a resource against the user's desired access or the result of that check.

RACF database
A collection of interrelated or independent data items stored together without redundancy, to serve the Resource Access Control Facility (RACF).

RACF DB2 external security module
A RACF module that receives control from the DB2 access control authorization exit point to handle DB2 authorization checks.

Pertaining to a data set for which the RACF indicator is set on. If a data set is RACF-indicated, a user can access the data set only if a RACF profile or an entry in the global access checking table exists for that data set.

RACF manager
The set of routines within RACF that provide access to the RACF database.

Pertaining to resources that are defined to RACF. A data set that is RACF-protected by a discrete profile must also be RACF-indicated.

RACF remote sharing facility (RRSF)
A set of RACF functions that links together multiple RACF databases, allowing remote RACF administration and password synchronization.

RACF remote sharing facility node (RRSF node)
A z/OS UNIX system image or a group of z/OS UNIX system images that share a RACF database.

RACF remove ID utility
A RACF utility that identifies references to residual or specified user IDs and group names in the RACF database that can be removed after review and possible modification. See also residual user ID.

RACF report writer
A RACF function that produces reports on system use and resource use from information found in the RACF System Management Facility (SMF) records.

RACF segment
The portion of a RACF profile that contains basic information needed to define a user, group, or resource to RACF.

RACF SMF data unload utility
A RACF utility that enables installations to create a sequential file from security-relevant audit data. The sequential file can be viewed directly, used as input for installation-written programs, and manipulated with sort-merge utilities. It can also be uploaded to a database manager to process complex inquiries and create installation-tailored reports. See also SMF record.

RACHECK request
In RACF, the issuing of the RACHECK macro or the RACROUTE macro with REQUEST=AUTH specified. The primary function of a RACHECK request is to check a user's authorization to a RACF-protected resource or function. See also authorization checking, RACROUTE.

RACINIT request
In RACF, the issuing of the RACINIT macro or the RACROUTE macro with REQUEST=VERIFY or REQUEST=VERIFYX specified. A RACINIT request is used to verify the authority of a user to enter work into the system. See also RACROUTE.


  1. A free-standing structure or frame that can hold multiple servers and expansion units.
  2. A free-standing structure that can hold multiple servers, storage systems, chassis, switches, and other devices.
  3. See enclosure.

rack configuration list
A list of all of the equipment within the rack and the logic cards within the card enclosure.

rack number
In DFSMSrmm, a 6-character identifier that corresponds to a specific volume's shelf location in the installation's removable media library; the rack number is the identifier used on the external label of the volume to identify it. See also cell, shelf location.

rack pool
In DFSMSrmm, a group of shelves that contains volumes that are generally read-only.

rack stabilizer
A plate that holds the rack stable or steady when a device is pulled out for service.

See Random Automated Cartridge Loader.

In RACF, a macro that provides a means of calling RACF to provide security functions. See also RACHECK request, RACINIT request.

radar chart
A chart in which variables are displayed on different axes that start from the same point.

RAD file
A file containing deployment objects such as task templates, system profiles and software components used to archive data or to transfer data between two OS deployment servers. A RAD file has a .rad extension.

radial tree display
A display type in which associations among entities are arranged is a circular pattern that radiates outward from the center.

In mobile computing, the medium for transmitting a signal from a cell site to a mobile device. When a cellular device moves from one cell to another, the cell site transmits a radio signal that a device responds to by switching to the newest, closest cell. Cellular devices originally used FM signals to communicate with devices. See also base station, cell, radiolocation, transceiver.

radio button
In graphical user interfaces, a control that comprises a circle with text beside it, representing one of set of mutually exclusive choices. The circle is partially filled when a choice is selected.

radio data terminal (RDT)
A hand-held or truck mounted radio unit or PDA that provides operators permanent contact with a host system through radio. Data is entered by a bar code scanner and keypad and sent to the host computer to process.

radio frequency identification (RFID)
An automatic identification and data capture technology that identifies unique items and transmits data using radio waves. See also active radio frequency identification.

radio frequency terminal (RFT)
A portable device that an operator uses to communicate with the system while working throughout a warehouse.

A primitive form of geolocating, most often using radio signals from a cellular base station to trilaterate the user's position.

A primitive form of geolocation, most often using radio signals from cellular base stations to trilaterate the user's position based on radio signal. See also geocoding, geolocation, Geospatial Entity Object Code, geotagging, global positioning system, radio, reverse geocoding.

See remote authentication dial-in user service.

The positive integer by which the weight of the digit place is multiplied to obtain the weight of the digit place with the next higher weight; for example, in the decimal numeration system the radix of each digit place is 10, in a biquinary code the radix of each fives position is 2.

radix character
The character that separates the integer part of a number from the fractional part. X/Open .

radix-tree index
In DB2 for i5/OS, an object that provides random access to rows in a database table. See also encoded-vector index.

ragged hierarchy
A hierarchy that contains members that have parents at a level higher than the immediate parent level in the hierarchy.

ragged left
Pertaining to text that is not aligned to the left margin. See also ragged right.

ragged right
Pertaining to text that is not aligned to the right margin. See also ragged left.

See remote alarm indication.

See receive-any input area.

See Redundant Array of Independent Disks.

A data striping technique, which is commonly called RAID Level 0 or RAID 0 because of its similarity to common, RAID, data-mapping techniques. It includes no data protection, however, so, strictly speaking, the appellation RAID is a misnomer. RAID 0 is also known as data striping.

A form of storage array in which two or more identical copies of data are maintained on separate media.


  1. A collection of two or more physical drives that present to the host an image of one or more drives. In the event of a physical device failure, the data can be read or regenerated from the other drives in the RAID due to data redundancy.
  2. A combination of RAID 0 and RAID 1 in which two identical copies of striped data exist, but there is no parity.

A form of parity RAID in which all disks are assumed to be rotationally synchronized, and in which the data stripe size is no larger than the exported block size.

A form of parity RAID in which the disks operate independently, the data stripe size is no smaller than the exported block size, and parity check data is distributed across the array's disks.

A form of RAID that can continue to process read and write requests to all of an array's virtual disks in the presence of two concurrent disk failures.

RAID controller
See node canister.

RAID level
The level of protection provided by the specific techniques of striping, mirroring, or parity used by a Redundant Array of Independent Disks (RAID).

RAID type
See RAID level.

Hardware attached inside a rack to hold devices that are designated as installable in a rack. See also slide.

See redundant array of independent memory.


  1. See repository access manager.
  2. See random access memory.

See commercial processing workload.

ramp meter
A device, usually a basic traffic light or a two-section signal (red and green only, no yellow) light together with a signal controller, that regulates the flow of traffic entering freeways according to current traffic conditions.

random access

  1. Pertaining to a computer's process of reading data from and writing data to storage in a nonsequential manner.
  2. In COBOL, an access method in which the program-specified value of a key data item identifies the logical record that is obtained from, deleted from, or placed into a relative or indexed file.
  3. An access mode in which records can be referred to, read from, written to, or removed from a file in any order.

random access memory (RAM)
Computer memory in which any storage location can be accessed directly. See also direct access storage, direct access storage device, disk unit.

Random Automated Cartridge Loader (RACL)
A cartridge loader that includes individual drives that can have their own facility to use an automated tape library.

random by key
A processing method for files in which the value in the key field identifies the records to be processed.

random by relative record number
A processing method for files in which relative record numbers identify the records to be processed.

random file access
The location of a record that matches a specific index key value. Random access of the records in a file requires that the file have a unique index and that each record have a unique index key value.

random function
A function that specifies a column value in a column map by returning a random number within the range specified by the low and high values.

The process of distributing schedule start times for different clients within a specified percentage of the schedule's startup window.

random number
A number obtained by chance.

random password
An arbitrarily generated password used to increase authentication security between clients and servers.

random processing
A method of processing in which records can be read from, written to, or deleted from a file order requested by the program that is using them. See also consecutive processing, sequential processing.

random read
The normal OSAM buffering method, which reads only one block with each I/O operation.


  1. The categorization of an attribute into different segments.
  2. The number of consecutive occurrences of the component in the data stream. The range is composed of two numbers separated by a colon.
  3. A contiguous set of values of a scalar type. A range is specified by giving the lower and upper bounds for the values. A value in the range is said to belong to the range.
  4. The set of values that a quantity or function may take.
  5. In a spreadsheet, the scope that contains one cell or multiple cells. 
  6. In architecture, a table heading for architecture syntax. The entries under this heading give numeric ranges applicable to a construct. The ranges can be expressed in binary, decimal, or hexadecimal. The range can consist of a single value.

range-clustered table (RCT)
A table whose data is tightly clustered across one or more columns. Each record in the table has a predetermined offset from the logical start of the table, which allows rapid access to the data.

range fragmentation
A distribution scheme that distributes data in table fragments that contain a specified key range. This technique can eliminate scans of table fragments that do not contain the required rows, making queries faster.

The user-specified acceptable limits for input values for each calibration point.

range operator
The logic used when comparing two attributes in a range.

range-partitioned table space
A type of universal table space that is based on partitioning ranges and that contains a single table. See also partition-by-growth table space, universal table space.

range rule
A user-defined algorithm for expression-based fragmentation. It defines the boundaries of each fragment in a table using SQL relational and logical operators. Expressions in a range rule can use the following restricted set of operators: >, <, >=, <=, and the logical operator AND. See also arbitrary rule.


  1. A formula that combines attributes as a result of a search that uses multiple attributes and orders the attributes for display in the user interface. Rank is used in the "Near Field People Search" profile, where there are attributes, such as sunglasses or baldness, that describe a "person" object. See also raw rank, weighted rank.
  2. An integer value that signifies the relevance of a given part to the results of a query. A higher rank signifies a closer match.
  3. See array.
  4. A property that determines the order of a reason.

rank function
A function that computes the scalar result for each value in a set with respect to the entire set. A rank function may only be used in the selection list of a SELECT statement.


  1. The process of sorting and prioritizing search results, by using techniques such as link analysis or relevance, so that the results that are most likely to be useful appear first in the list of results.
  2. The assignment of an integer value to each document in the search results from a query. The order of the documents in the search results is based on the relevance to the query. A higher rank signifies a closer match. See also dynamic ranking, static ranking.

See root anchor point.

rapid deployment tool
One of a set of tools to rapidly develop and deploy Java EE artifacts on the server and package the Java EE artifacts into the deployed EAR file.

An architecture that uses packet-switched interconnect technology in embedded systems for passing data between processors or devices.

Rapidly Adaptive Visualization Engine (RAVE)
A system for the general visualization of all forms of data. RAVE is embedded within IBM Cognos Analytics, and provides the ability for innovative and interactive visualizations.

Rapid Network Reconnect (RNR)
A function of IMS that automatically reconnects IMS VTAM terminal sessions across outages (IMS, z/OS, or VTAM) and subsequent IMS restarts on the same or different z/OS systems within a sysplex.

Rapid Transport Protocol (RTP)
A connection-oriented, full-duplex transport protocol for carrying session traffic over High-Performance Routing (HPR) routes. See also automatic network routing, Rapid Transport Protocol connection.

Rapid Transport Protocol connection (RTP connection)
A connection between two High-Performance Routing (HPR) nodes that may traverse one or more intermediate HPR nodes and links. The connection endpoints provide error recovery and adaptive rate-based flow control for the connection traffic, and nondisruptive switching of the underlying physical path in the case of route outage. The intermediate HPR nodes minimize their routing overhead using automatic network routing (ANR) protocols, which rely on header information to permit efficient source routing and prioritized transmission along the RTP connection. See also Rapid Transport Protocol.


  1. See resource adapter archive.
  2. See route addition resistance.

See risk adjusted return on capital.

See Reverse Address Resolution Protocol.

See reliability, availability, and serviceability.

RAS attribute
An attribute that the server applies to a request to control how the server processes that request. RAS attribute values can be defined with server-level, protocol-level, or request-level granularity. See also reliability, availability, and serviceability.

RAS granularity
The extent to which a user can assign different RAS attribute values to different sets of requests within the same application server. The user can define RAS attribute values on a per-server, per-protocol, or per-request basis. See also protocol-level RAS granularity, reliability, availability, and serviceability, request-level RAS granularity, server-level RAS granularity.


  1. The area of the video display that is covered by sweeping the electron beam of the display horizontally and vertically. Normally the electronics of the display sweep each line horizontally from top to bottom and return to the top during the vertical retrace interval.
  2. In computer graphics, a predetermined pattern of lines that provides uniform coverage of a display space.
  3. In nonimpact printers, an on-or-off pattern of electrostatic images produced by the laser print head under control of the character generator.

raster font
A font in which the characters are defined directly by the raster bit map. See also outline font.

raster graphic
A computer graphic in which a display image is composed of an array of pixels arranged in rows and columns. See also coordinate graphic.

raster overlay
See raster pattern overlay.

raster pattern
A series of picture elements (pels) arranged in scan lines to form an image.

raster pattern generator (RPG)
The electronic circuits that retrieve digitized raster patterns and convert them into a series of scan patterns.

raster pattern overlay
An overlay loaded in a printer as a raster pattern, rather than as a sequence of commands. See also coded overlay.

raster pattern storage (RPS)
An area of storage that holds raster patterns for fonts and images.

raster scan
A technique of generating or recording the elements of an image by a line-by-line sweep across the entire output medium. A raster scan may be directed by a program, in which case it may also be considered a directed-beam scan.

To calculate the charges for shipments and freight payment vouchers.

rate break
A price increase or reduction that is based on criteria such as the number of stops or the distance of a route. See also break schedule.

rate card
The price list component of the billing template that lists all the rate cards associated with that billing template.

rate code
The identifier of a rate that is used to link a resource unit or volume metric with its charging characteristics.

rated throughput
For data links, the rate at which all of the offered frames are forwarded by the device.

rate group
A group of rate codes that is used to create rate subtotals in reports, graphs, and spreadsheets.

rate ID
See rate identifier.

rate identifier (rate ID)
A reference that is attached to a shipment that shows which line item on a contract was used to rate the shipment.

rate plan
A service plan offered by telecommunication service providers.

rate summary
A summary of the charges, which are defined in the contracts, that are automatically calculated for each shipment.

rate type
A rate that is defined as per the time spent by contractors on the tasks they perform.

rating method
The way in which a user defines how transportation charges are calculated. For example, a user might want to calculate the charges based on distance, weight, or a flat rate.

rating type
A setting that specifies whether a contract lane uses a fixed rate or spot rate.

rational number
A real number that is the quotient of an integer divided by an integer other than zero.

Rational Unified Process (RUP)
A configurable software development process platform that is used to assign and manage tasks and responsibilities within a development organization.

ratio object
An object that can be created to calculate and store the ratio of deviations between two events or dimensions.

See Rapidly Adaptive Visualization Engine.

raw data

  1. Data that has not been processed or reduced.
  2. Unprocessed data that contains information about software items and manufacturers, obtained through software scans.

raw data set
A file that contains unfiltered data about software items and manufacturers, obtained through software scans. A knowledge base analyst can use the raw data set as a basis for defining unique software items and signatures in the knowledge base. See also expectation list, signature candidate.

raw device
In UNIX-based operating systems, a block device that handles data as a stream of bytes, rather than as a block.

raw disk
A storage disk that is not allocated to a PowerHA SystemMirror volume group.

raw I/O
Character-oriented access to a block device not utilizing in-core buffers.

raw logical volume
A portion of a physical volume that is comprised of unallocated blocks and has no journaled file system (JFS) definition. A logical volume is read/write accessible only through low-level I/O functions.

raw rank
A ranking formula that treats each attribute equally. See also rank, weighted rank.

raw request
The message that is sent before any business application processing is done.

raw table
A nonlogged permanent table that uses light appends. See also light append.

raw time
The time taken by an application to run, including the overhead introduced by profiling the application. See also compensated time.

See relative byte address.

See role-based access control.

See rule-based break iterator.

See role-based management.

See rollback required.

See robbed-bit signaling.


  1. See restart and cleanup.
  2. See return code.


  1. See resource control block.
  2. See record control byte.

See read cache device.

See real-time control microcode.

RC message
Recovered message; that is, an IP message that was copied from the control queue of an inoperable or closed ASP via the recover command.

See remote change management server.

See reliable connected queue pair.

See Revision Control System.


  1. See resource control table.
  2. See range-clustered table.
  3. See routing channel template.

See report designer.

See relational database.

RDB directory
The directory where remote databases in the network are registered. Information in a directory tells the system which communications parameters to use to connect to a remote database. The RDB directory also contains the name of the local database.

See relational database management system.

See resource definition data set.


  1. See record definition field.
  2. See Resource Description Framework.
  3. See Resource Framework Definition.

RDF Site Summary
An XML file format for syndicated web content that is based the RSS 0.9, 1.0 and 1.1 specifications and incorporates the Resource Description Framework (RDF), a web standard for metadata. The RSS XML file formats are used by Internet users to subscribe to websites that have provided RSS feeds. See also Atom, feed, Really Simple Syndication, Resource Description Framework, Rich Site Summary.

RDF store
A set of tables that store an RDF data set. See also Resource Framework Definition.

A unique URI that identifies an artifact across linked data to avoid conflicts with other artifacts that have the same name but different properties.

See resource definition macro.

See Remote Direct Memory Access.

RDMA network interface card (RNIC)

  1. An IBM 10GbE RoCE Express feature that enables Remote Direct Memory Access by managing low-level functions that are typically handled by the TCP/IP stack.
  2. A network I/O adapter or embedded controller that has RDMA capability.

RDMA over Converged Ethernet (RoCE)

  1. A network protocol that permits RDMA communications over an Ethernet network.
  2. An InfiniBand Trade Association (IBTA) standard that enables Remote Direct Memory Access over Converged Ethernet.

RDMA over Ethernet
See Internet Wide Area RDMA Protocol.

See relational database management system.

See relative distinguished name.

See resource definition online.

See Remote Desktop Protocol.


  1. See Relational Data Services.
  2. See restart data set.

See read-only dynamic storage area.


  1. See resource definition table.
  2. See radio data terminal.

See record descriptor word.

See remote extension.

Pertaining to the ability of a node or a resource to communicate with another node or resource.

reach through
A means of extending the data accessible to the end user beyond that which is stored in the OLAP Server. A reach through is performed when the OLAP Server recognizes that it needs additional data and automatically queries and retrieves the data from a data warehouse or OLTP system.

reactive class
A composite class that has a statechart and consumes events.

reactive maintenance
See corrective maintenance.

reactive object
An object that is a composite, and can receive and process events. Reactive objects have state-based behavior that is defined in a statechart.

The quality in type and its spacing and composition that affects how comfortably printed matter can be read over a sustained period. Examples of characteristics that influence readability are type quality, spacing, and composition.

read access

  1. An access intent that establishes the intent of an application to read the database (without making modifications) and to be protected from an updater's incomplete changes. It allows other applications to share the database. See also scheduling intent.
  2. In computer security, permission to read information.

read access list
A list that restricts a form so that only specified users can read documents created from the form. Use the reader's field to control access on a document-by-document basis.

read access state
A state indicating that only read access to a table is allowed.

read ahead
An option that allows messages to be sent to a client before an application requests them.

readahead prefetching
A method of prefetching pages by looking ahead in a scan, which results in asynchronous retrieval of pages even though those pages are not located sequentially on disk.

read authority

  1. An authority subset that allows the user to read entries in an object. The system-recognized identifier is *R. *R authority combines object operational authority and read authority.
  2. A data authority that allows the user to look at the contents of an entry in an object.

read cache device (RCD)
A volatile solid-state disk that is optimized for use as memory for the extended adaptive cache.

read committed
An ANSI compliant level of isolation that the SET TRANSACTION statement can specify, in which a user can view rows that are currently committed at the moment of the query request, but cannot view rows that were changed as part of a currently uncommitted transaction. This is the default isolation level for databases that are not ANSI compliant. See also committed read.


  1. A program that formats data so that the user can explore and work with the data. Developers create customized readers for the more complicated and structured data.
  2. In micrographics, a device that enlarges microimages for viewing.
  3. In bar code systems, the scanner or combination of scanner and decoder.
  4. In RJE, a program that reads jobs from a database file or interactive display station and sends them to the host system.
  5. An internal program that reads jobs from an input device or a database file and places them on a job queue.

reader access

  1. An access level with which users can only read documents.
  2. In Connections Files, an access level that allows a user to read, comment on, download, and recommend a file. A user with this access cannot upload new versions of the file.

reader DSP
A dynamic support program (DSP) that transfers job-related information, such as control statements, from an input device to the spool data set.

readers list
A feature that controls who can read a Notes document.

read/execute authority
An object authority that allows the user to read entries in an object, run a program, and search a library or directory. Read/execute authority combines object operational authority, read authority, and execute authority. The system-recognized identifier is *RX.

read-from-invited-program-devices operation
An input operation that waits for input from any one of the invited program devices for a user-specified time. See also read-from-one-program-device operation.

read-from-one-program-device operation
An input operation that will not complete until the specified device has responded with input. See also read-from-invited-program-devices operation.

read hit
Data requested by the read operation that is in the cache.

readiness level
For an RSR database-level tracker, the level that determines whether a shadow database is ready to apply database changes as they are received from the active IMS. See also recovery-readiness-level database.

reading group
A record that is associated with an asset or location that contains reading logs. The record links the reading logs to an associated job plan for processing.

reading log
A record that contains readings that are taken against an asset or location.

read integrity
An attribute of a read request, which ensures the integrity of the data passed to a program that issues a read-only request. CICS recognizes two forms of read integrity: consistent and repeatable. See also consistent, dirty read, repeatable.

read intent
The type of access intent that subsystems use to read data from a database.

read lock
A lock that prevents any other process from setting a write lock on any part of the protected area. See also write lock.

readme file
A file that contains the information that users need to know before they install and use a fix or maintenance release of a product.

read miss
Data requested by the read operation that is not in the cache.

Pertaining to data that changes dynamically.

Pertaining to data that can be read but cannot be modified.

read-only access
An access level that permits a user or an application to read a document or record but not to update it. See also scheduling intent.

read-only access mode
An access mode associated with a virtual disk that allows a user to read, but not write or update, any file on the disk.

read-only dynamic storage area (RDSA)
The key-0 storage area for all reentrant programs and tables below the 16 MB line.

read-only memory (ROM)
Memory in which stored data cannot be changed by the user except under special conditions.

read-only mode
A recovery mode of operation employed when RACF is enabled for sysplex communication. Read-only mode does not allow updates to be made to the RACF database except for statistics generated during logon and job initiation.

read-only storage (ROS)

read-only variable
An automatic class selection (ACS) language variable that contains data set or system-derived information. It can be referenced, but not altered, in an ACS routine.

read operation
An input operation that obtains data from a file or device and passes it to a program.

read queue
A message queue in a module or driver containing messages moving upstream. Associated with input from a driver.

read rate
In bar codes, the ratio of the number of successful reads on the first attempt to the total number of attempts made to obtain a successful read.

read stability (RS)
An isolation level under which a query that is issued more than once in a transaction is guaranteed to read the same rows for each subsequent execution. However, in subsequent executions, the query might read additional (phantom) rows that were inserted or updated and then committed by statements in concurrently running transactions. A query in a transaction using RS is prevented from reading any rows changed by statements in other transactions until the changes have been committed. Also, until the transaction using RS has been committed, any rows that a query in that transaction reads cannot be changed by statements in other transactions. See also cursor stability, isolation level, repeatable read, uncommitted read.

read-through cache
A sparse cache that loads data entries by key as they are requested. When data cannot be found in the cache, the missing data is retrieved with the loader, which loads the data from the back-end data repository and inserts the data into the cache.

read trigger
A trigger that is activated by a read operation on the table or view that is specified in the trigger definition. See also insert trigger, instead of trigger, trigger, update trigger.

read uncommitted
An ANSI-compliant level of isolation, set with the SET TRANSACTION statement, that does not account for locks. This allows a user to view any existing rows, even rows that can be altered within currently uncommitted transactions. Read uncommitted is the lowest level of isolation (no isolation at all), and is thus the most efficient. See also dirty read.

read with integrity
See read access.

read without integrity
See read-only access.

read/write access mode
In VM, an access mode that is associated with a virtual disk that allows a user to read and write any file on the disk.

read/write authority
An object authority that allows the user to add, change, delete, and read entries in an object. Read/write authority combines object operational authority, read authority, add authority, update authority, and delete authority. The system-recognized identifier is *RW.

read/write/execute authority
An object authority that allows the user to add, change, delete, and read execute entries in an object, run a program, and search a library or directory. Read/write/execute authority combines object operational authority, read authority, add authority, update authority, delete authority, and execute authority. The system-recognized identifier is *RWX.

read/write head
The data sensing and recording unit of the diskette drive or tape drive.

read/write variable
An automatic class selection (ACS) language variable that is assigned a value within an ACS routine. It can be referenced, and each ACS routine assigns a value to its own, unique, read/write variable.


  1. Pertaining to a state in which a device or program is prepared to accept further commands.
  2. Pertaining to a status where all the loaded and mounted image catalog entries are available for use by the active virtual optical device. Any image catalog entry with a status of unloaded is not available for use by the virtual optical device. The image catalog can be made ready by using the LODIMGCLG (Load Image Catalog) command with OPTION(*LOAD).

ready list
A display list of all the operations ready to be processed at a workstation. Ready lists are the means by which workstation operators manually report on the progress of work.

ready queue
A MERVA queue used by SWIFT Link to collect SWIFT messages that are ready for sending to the SWIFT network.

real address
The address by which a logical unit (LU) is known within the SNA network in which it resides. See also network address translation.

real attribute
An attribute that must have a value. See also pseudoattribute.

real capacity
The amount of storage that is allocated to a volume copy from a storage pool.

real device
The actual device hardware.

real estate
In Digital Analytics, a region or an amount of space on a web page. Real estate is used to analyze the performance of particular pages, different versions of a page (for example, in an A/B test), sub-sections of a page, and individual links within a page. Real estate values are collected using cm_re= parameters.

real GID
See real group ID.

real group ID (real GID)

  1. For each user, the group ID defined in the password file.
  2. The attribute of a process that, at the time of process creation, identifies the group of the user who created the process. This value is subject to change during the process lifetime. See also effective group identifier, group identifier.

realization relationship
In UML, a dependency relationship in which one class implements the behavior that another class specifies. See also dependency relationship.

In the web diagram editor, to associate a node with an actual resource by creating that resource or by editing the node path so that it points to an existing resource. See also unrealized.

Really Simple Syndication (RSS)
An XML file format for syndicated web content that is based on the Really Simple Syndication specification (RSS 2.0). The RSS XML file formats are used by Internet users to subscribe to websites that have provided RSS feeds. See also Atom, feed, RDF Site Summary, Rich Site Summary.


  1. In the Kerberos protocol, the set of principals for which a specific key distribution center (KDC) is the authenticating authority.
  2. A collection of resource managers that honor a common set of user credentials and authorizations.
  3. A named collection of users and groups that can be used in a specific security context.
  4. A grouping of customers, organized by division, region, or company, which is used to separate customer data.

real memory
The active physical memory on any system.

realm name
The machine name of a user registry.

realm trust
The Kerberos protocol either searches the configuration file to determine realm trust or by default looks for trust relationships within the realm hierarchy. Using Trusted realms in network authentication service allows you to bypass this process and creates a shortcut for authentication. Realm trust can be used in networks where realms are in different domains. For example, if a company has one realm at NY.myco.com and another at LA.myco.com, then you can establish trust between these two realms. If two realms trust each other their associated KDCs must share a key. Before creating a shortcut, you must set up the KDCs to trust each other.

real name
The name by which a resource is identified in its native network.

real number

  1. A number that can be represented by a finite or infinite numeral in a fixed-radix numeration system.
  2. A number that contains a decimal point and is stored in fixed-point or floating-point format.
  3. See R-formatted number.

real object
An object that represents an actual resource. See also aggregate object.

real optical library
A physical storage device that houses optical disk drives and optical cartridges, and contains a mechanism for moving optical disks between a cartridge storage area and optical disk drives. See also pseudooptical library.

real question
A numeric question that permits a decimal number as an answer, such as a question that asks the respondent to guess the price of a product.

real resource

  1. In VTAM, a resource identified by its real name and its real network identifier.
  2. In the NetView Graphic Monitor Facility, an individual network resource represented by a real object.

real storage

  1. Storage directly accessible to the processor from which instructions can be run and from which instructions can fetch data.
  2. The main storage in a virtual storage system. Physically, real storage and main storage are identical. Conceptually, however, real storage represents only part of the range of addresses available to the user of a virtual storage system.

real storage manager (RSM)
A device that controls the allocation of central storage during initialization of z/OS.

real time
The processing of information that returns a result so rapidly that the interaction appears to be instantaneous.


  1. Pertaining to a process in which output data is available at the same rate at which input data is processed.
  2. In Open Systems Interconnection architecture, pertaining to an application such as a process control system or a computer-assisted instruction system in which response to input is fast enough to affect subsequent input.

real-time alert
An event that the Smart Surveillance Engine is pre-configured to watch for in a specified video channel stream.

real-time analysis (RTA)
In CICSPlex SM, a function that provides the automatic notification of requested error conditions and all aspects of a resource's status.

real-time authorization
The process of validating that a payment method is valid and can be used to pay for an amount of money when a payment method is added in the user interface.

real time availability monitor
In Sterling Selling and Fulfillment Suite, an agent that raises an event when inventory quantities change between specified thresholds.

real-time control microcode (RCM)
In X.25 communications, the microcode that runs on the X.25 Interface Co-Processor/2 to provide control functions.

real-time learning
See synchronous learning.

real-time replication
See synchronous replication.

Real-Time Streaming Protocol (RTSP)
A set of rules for establishing media sessions and providing display controls such as pause, fast forward, and reverse.

Real-Time Transport Protocol (RTP)
A protocol that provides end-to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services.

real UID
See real user ID.

real user ID (real UID)

  1. For each user, the user ID that is specified in the /etc/passwd file.
  2. An identifier that is associated with the user who initiates a session or who becomes the owner of one.
  3. The attribute of a process that, at the time a process is created, identifies the user who created the process. See also effective user identifier, user identifier.

real variable
A variable that holds one real (decimal) value for each case. For example, the response from a question that asks respondents for their estimate of the price of a drink.

To remove expired BLOBs from storage.

A storage tool that removes expired BLOBs from storage.

To resubmit an application. A candidate can resubmit an application if they have been rejected for a position and have additional information to supply that may result in the rejection being overturned.

rearm expression
An expression that generates an event that alternates with an original event in the following way: the event expression is used until it is true; then, the rearm expression is used until it is true; then, the event expression is used. The rearm expression is commonly the inverse of the event expression. It can also be used with the event expression to define an upper and lower boundary for a condition of interest.

rearm predicate
See rearm expression.

reasonable resource loaded value (RRLV)
A value used by PSF to keep the number of resources loaded at a manageable level. At data set end, PSF deletes resources for a particular resource type until this value is reached.

reason code

  1. A return code that describes the reason for the failure or partial success of a Message Queue Interface (MQI) call.
  2. A value used to indicate the specific reason for an event or condition.
  3. An industry-standard code that shippers and carriers can use to identify a change to a shipment. For example, a reason code can be specified if a dock appointment, shipment status, or estimated time of arrival (ETA) is updated.
  4. A code assigned to identify a reason. Each scorecard can have multiple reasons.

reasoning strategy
The strategy used to sort and compute the reasons returned from a scorecard table.


  1. In communications, the process of putting segmented packets back together after they have been received.
  2. In OSI, a function performed by an (N)-entity to map multiple (N)-protocol-data-units into one (N)-service-data-unit. Reassembly is the opposite of segmenting.

To mark a disk sector as damaged. The marked disk sector points to another sector location where the data from the damaged sector is moved.

An optimization technique that rearranges the sequence of calculations in a subscript expression producing more candidates for common expression elimination.

In cross-site mirroring, to reassociate the mirror copy with its production copy after user operations on the mirror copy are complete. When the mirror copy is reattached, it is automatically synchronized to match the production copy again. All data on the mirror copy prior to when it is reattached to the production copy is cleared.

reattachment event
An event whose firing has caused an activity to be activated.

reattachment queue
A list of the reattachment events that have caused a particular activity to be activated. Each activity has a reattachment queue associated with it. The queue may be empty. Events remain on the reattachment queue until they are retrieved by the activity, or until a sync point occurs.

To restripe and redistribute data across the available hard disks after a disk or disks have been removed from a file system.

A ClearCase operation that makes a development work area current with the set of versions represented by a more recent baseline in another stream, usually the project's integration stream or a feature-specific development stream.

A return of a portion of the purchase price in the form of cash by the seller to the buyer.

rebill voucher
A freight payment voucher that is manually resent to the shipper organization as an EDI 210 carrier invoice transaction.


  1. To create a package for an application program by using information from the previously bound package. For example, in DB2 for Linux, UNIX, and Windows and DB2 for z/OS, if an index is added for a table that is accessed by a program, the package must be rebound for it to take advantage of the new index. See also automatic rebind, explicit rebind, implicit rebind, recompile.
  2. To reestablish a communications channel for making remote procedure calls after that channel has been closed.
  3. To request renewal of a lease from a system on a particular network.
  4. To associate all backed-up versions of a file with a new management class name. For example, a file that has an active backup version is rebound when a later version of the file is backed up with a different management class association. See also bind, management class.

To reinitialize the execution of a program by repeating the initial program load (IPL) operation.

To restore a database or a subset of its table spaces by using a set of table space restore operations.

rebuild area
Reserved capacity that is distributed across all drives in a redundant array of drives. If a drive in the array fails, the lost array data is systematically restored into the reserved capacity, returning redundancy to the array. The duration of the restoration process is minimized because all drive members simultaneously participate in restoring the data. See also distributed RAID.

rebuild maintenance
A method of maintaining keyed access paths for database files. This method updates the access path only while the file is open, not when the file is closed; the access path is rebuilt when the file is opened. See also delayed maintenance, immediate maintenance.

rebuild phase
The stage that a database is in from the time that the database successfully completes a rebuild restore operation until the first time that the database is rolled forward and log records start being processed.


  1. To break and transfer the user lock and party lock of a presented contract from the external party to the internal party.
  2. To copy a migrated file from server storage back to its originating file system using the hierarchical storage management client. See also selective recall.
  3. An information retrieval measurement that specifies the percentage of relevant data that is retrieved, out of all available relevant data. Recall is a measure of sensitivity. Information retrieval is best measured by using both precision and recall. See also precision.
  4. The process of moving a migrated data set from a level 1 or level 2 volume to a volume that is or is not managed by DFSMShsm. See also hierarchical storage management.

In update-anywhere replication, to capture changes at a replica table and forward these changes to the master table or to other replica tables.

An electronic document that verifies or acknowledges a trading partner agreement. See also Message Disposition Notification.

receipt acknowledgment
A positive business signal that acknowledges receipt of a message. The receipt acknowledgment is sent from the receiver of a valid business action message back to the sender. Validity of the message is determined by RNIF base-level validation or by additional validation requirements negotiated between trading partners.

In X.25 communications, to take an incoming packet (such as an incoming-call packet or a data packet) from the buffer.

receive-any control element (RACE)
Type of control field held in the CICS receive-any pool set aside for VTAM receive-any operations. The number of RACEs maintained depends on the RAPOOL and MXT system initialization parameters and on the number of active tasks.

receive-any input area (RAIA)
Type of input area held in the CICS receive-any pool set aside for VTAM receive-any operations. The number of RACEs maintained depends on the RAPOOL and MXT system initialization parameters and on the number of active tasks.

received amendment contract
An amendment contract that was initially created outside the Emptoris Contract Management application and later integrated into it.

received contract
A contract that was initially created outside the Emptoris Contract Management application and later integrated into it. The contract document must be a Microsoft Word document.

received license plate number (RLPN)
A bar code identifier of a specific pallet, carton or case and its contents that have been received at its destination.

received page counter
See channel counter.

receive exit
A type of channel exit program that is called just after the message channel agent (MCA) has regained control following a communications receive and has received a unit of data from a communications connection. See also send exit.

receive mode
A time during which the BSC adapter looks for synchronization characters, and stores the data characters in main storage.

receive not ready (RNR)
In communications, pertaining to a data link command or response that indicates a temporary condition of being unable to accept incoming frames.

receive pacing
In SNA, the pacing of message units that a component is receiving. See also send pacing.

receive queue
In Q replication, a WebSphere MQ message queue that is used by a Q Apply program to receive transactions that are captured by a Q Capture program.


  1. In hardware, a functional unit that converts small electronic signals to signals that control a device.
  2. The object handling a stimulus passed from a sender object. See also sender.
  3. A server repository that contains a log of server and client messages as events. For example, a receiver can be a file exit, a user exit, or the server console and activity log. See also event.
  4. A defined role in WebSphere Commerce that receives inventory at the fulfillment center, tracks expected inventory records and ad hoc receipts for ordered products, and receives returned products as a result of customer returns. See also logistics manager.

receiver bean
In extended messaging, a message-driven bean or a session bean. A message-driven bean is invoked when a message arrives at a JMS destination for which a listener is active. A session bean polls a JMS destination until a message arrives, gets the parsed message as an object, and can use methods to retrieve the message data.

receiver chain
The journal receivers presently or previously attached to the same journal. Each journal receiver, except the first one, has a previous receiver that was attached before the current receiver. Each journal receiver, except the currently attached receiver, has a next receiver.

receiver chain break
A logical break in a receiver chain.

receiver channel
In message queuing, a channel that responds to a sender channel, takes messages from a communication link, and puts them on a local queue.

receiver directory
Summary information about the journal receivers that are or were attached to the specified journal and are still known to the system.

receive ready (RR)
In communications, pertaining to a data link command or response that indicates that a station is ready to receive protocol data units. Receive ready also acknowledges receipt of protocol data units.

receiver number
The number assigned to track the receipt of goods through the warehouse. A receiver number can be assigned to all receipts in the warehouse.

receive timeout
In data communications, a condition that occurs when no data is received in a given period of time.

The process of unloading and verifying a shipment from a vendor, including the notification that items shipped from the vendor have arrived.

receiving cross-domain key
In Cryptographic Support, a cross-domain key used to decrypt a data-encrypting key that was encrypted by another location.

receiving node
The warehouse or distribution center that is receiving the shipment of products.

receiving number
See receiver number.

receiving work sheet
A data entry form used to enter the items received in a store.

recency, frequency, monetary (RFM)
A technique used to determine which customers are the best ones by examining how recently a customer has purchased (recency), how often they purchase (frequency), and how much the customer spends (monetary).

Recent File Transfer Activity widget
A widget that provides a graph that depicts volume of file transfers over time for each type of monitored server. From the widget, a list of transfers for each server type can be accessed to troubleshoot server issues.

recent view
A snapshot of the last non-empty current view. A recent view is what appears in the workbench when editing an object that displays view results.

A hollowed electrical fitting that contains the live parts of a circuit.

reception congestion
A network congestion condition occurring at a data switching exchange (DSE).

The process of validating which users remain as members of a service over time.

recertification policy
A policy that provides a periodic revalidation process for service memberships.

See record formatted maintenance statistics.

recharging catalog
A list of applicable one-time or recurring charges that are associated with circuits and equipment.

A set of certified instructions for connecting devices, sensors, and gateways on the Internet of Things.

A trading partner who joins into a contract agreement with another trading partner to receive data.

recipient address
A string of data that represents the address associated with the recipient of the message. The contents and format of the string are not defined by the mail server framework. The address type associated with the recipient address is assumed to define the contents of the recipient address field.

recipient history tree
A structure that represents the changes to the recipient list, so that a recipient can be traced back to the recipient entry in the original recipient list passed using the Create Mail Message application program interface (API).

recipient list
A list that provides a connection to selected recipient-specific data in marketing databases that eMessage uses to address and personalize outbound marketing messages.

The process of consolidating the remaining data from many sequential-access volumes onto fewer, new sequential-access volumes.

reclamation threshold
The percentage of space that a sequential-access media volume must have before the server can reclaim the volume. Space becomes reclaimable when files are expired or are deleted.

See record maintenance statistics.

Recognition Engine server
In WebSphere Voice Server, the software that carries out the speech recognition and forwards the results to the client. This consists of one 'Tsm router' and at least one 'tsmp' and one 'engine'.

recognition profile
In the 3270 Terminal Services tool, a list of the identifiers that uniquely identify the state of a screen, that is, the set of conditions that apply to the screen at the time the screen was imported from the host. Each screen state needs to be uniquely defined in its own recognition profile.

recognition table
In the 3270 terminal services development tool, the table that appears in the screen editor and provides a screen definition view and a recognition profile view of the screen that was imported.

recognized private operating agency (RPOA)

  1. Any individual, company, or corporation, other than a government department or service, that operates a telecommunication service and is subject to the obligations undertaken in the Convention of the International Telecommunication Union and in the Regulations; for example, a communication common carrier.
  2. A private X.25 network that can optionally be selected by the user at call setup time to carry the X.25 traffic.

In OSI, a function performed by an entity that is the reverse of splitting.

recommendation plan
A mechanism that assigns offers to site zones for dynamic recommendations.

Recommendation X.21 (X.21)
A document, CCITT Recommendation X.21, that outlines standards for a general-purpose interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) for synchronous operations on a public data network.

Recommendation X.21 bis
A document, CCITT Recommendation X.21 bis, that outlines standards for the interface between data terminal equipment (DTE) and V-series data circuit-terminating equipment (DCE) for synchronous operations on a public data network.

Recommendation X.31
A document, CCITT Recommendation X.31, that outlines standards for the X.25 protocol over integrated services digital networks (ISDNs).

Recommended Communities widget
A widget that can be used to find communities that might be worth joining. The information provided by the widget can be used to help in deciding whether to join a recommended community.

recommended fix
A fix or group of fixes that contains no known or few significant defects and that every customer should install to maintain the stability of the system.

recommended line
A line item that is recommended to a customer in addition to the items that the customer has shown interest in buying.

recommended line item
A suggestion of an accompanying item and its cost that is included in a quote for information purposes only.

recommended service upgrade (RSU)
For z/OS systems, a PTF that has undergone Consolidated Service Test (CST) testing.

recommended update
A hardware update that every customer should install.

To re-create a package for an application program by using information in the application program code. See also rebind.

See reconnaissance.

To compare and optionally update the links in an artifact that point to other artifacts. When a source artifact is reconciled, its links are compared with the states of its associated target artifacts in another application. After reconciliation, the changes can be synchronized or ignored, or the associated artifacts can be updated. See also synchronize.


  1. A transaction that compares discovered assets to authorized assets.
  2. The process of synchronizing a file system with the server, and then removing old and obsolete objects from the server.
  3. The process of ensuring consistency between the original data repository and the larger system where the data is stored for backup. Examples of larger systems where the data is stored for backup are storage servers or other storage systems. During the reconciliation process, data that is identified as no longer needed is removed.
  4. The process of comparing the actual and authorized versions of a set of configuration items and resolving variances between the two versions.

reconciliation task
A scheduled task that uses a collection of rules and filters to link and compare data from two data sets. See also comparison rule, link rule, task filter.

RECON data sets
See recovery control data set.


  1. The process of adding hardware units to, or removing hardware units from, a configuration.
  2. The process whereby the cluster adjusts to changes in membership. See also dynamic automatic reconfiguration.

reconnaissance (recon)
A method by which information pertaining to the identity of network resources is gathered. Network scanning and other techniques are used to compile a list of network resource events which are then assigned a severity level.

See fast subsequent migration reconnect.


  1. A group of related data, words, or fields treated as a unit, such as one name, address, and telephone number.
  2. In VTAM, the unit of data transmission for record mode. A record represents whatever amount of data the transmitting node chooses to send.
  3. In Enterprise Service Tools, a schema or message that corresponds to a known COBOL COMMAREA data structure and that describes the states of the schema or message in a set of record descriptions.
  4. Any form of recorded information that is under records management control. A document that has legal or corporate value that requires a specific retention period and disposition policy.
  5. In programming languages, an aggregate that consists of data objects, possibly with different attributes, that usually have identifiers attached to them. In some programming languages, records are called structures.
  6. A set of one or more related data items grouped for processing.
  7. The storage representation of a row or other data. See also row.
  8. See row.

record address file
In RPG, an input file that indicates which records are to be read from another file and the order in which the records are to be read.

record and playback
A performance monitoring function that is used to record web transactions and Microsoft Windows applications, and then play back the recordings to assess transaction performance and availability. See also playback policy.

record area
In COBOL, a storage area in which a record described in a record description entry in the File Section is processed.

record boundary indicator
In System z LPEX Editor, a visual indicator of a file's record length limit.

record category
The top level record container in a records management file plan.

record class

  1. The classification that is assigned to a record and that represents a grouping of records. When the user selects the record class during declaration, they are also selecting a record type.
  2. The classification that is assigned to a record and that represents a grouping of master schedules. A classification library consists of record classes that are defined by the user to organize master schedules.

record control byte (RCB)
In multileaving telecommunications access method (MTAM), a control character used to identify each record type within a transmission block.

record data
Data sets with a record-oriented structure that are accessed record by record. This data set structure is typical of data sets on VM, MVS, and OS/400 systems. See also byte stream.

record data format
A format that maintains record boundaries for data that is being transmitted.

record definition field (RDF)
In the Virtual Storage Access Method (VSAM), a field stored as part of a stored record segment; it contains the control information required to manage stored record segments within a control interval. See also control interval definition field.

record description
A set of record recognition criteria combined with Boolean operators which are used as a profile of the state of a record.

record description entry
In COBOL, the total set of data description entries associated with a particular record.

record descriptor
Specifications that describe how record format line data records are formatted into individual print lines. Record descriptors are interpreted by PSF when formatting printed output.

record descriptor word

  1. Data preceding each structured field that specifies the length of the entire record including the RDW. A field preceding each record and specifying the length of the entire record including the RDW itself.
  2. Data preceding a variable record that specifies the length of the entire record including the RDW.

recorded meeting
A file containing the stored audio and video transcript of a meeting, which users can access later to see and hear the meeting.

A program that uses HTTP to record tests for SOAP-based, XML, plain text, or binary services.

record folder
A container below the category level for records in a file plan.

record format
A named part of a file that identifies records of a specified record format description.

record format definition
In IDDU, information that describes the arrangement or layout of fields in a record. A record format definition resides in a data dictionary.

record format description
A description of the characteristics of the fields (for example, type and length) and the arrangement of the fields in a record created by the user.

record format line data
A form of line data where each record is preceded by a 10-byte identifier. See also line data.

record formatted maintenance statistics (RECFMS)
A statistical record built by an SNA controller and usually solicited by the host.

record ID code
See record identification code.

record identification code (record ID code)
Characters placed in a record to identify the record format.

record identifier (RID)
A unique identifier that the DB2 database manager uses internally to identify a row of data in a table. See also row identifier.

record identifier pool (RID pool)
An area of main storage that is used for sorting record identifiers during list-prefetch processing.

record identifying indicator
An indicator that identifies the record just read.


  1. The information from performance snapshots that can be viewed at a later time.
  2. A collection of information about user actions performed on a monitored application for some time.

recording agent
A shared library loaded into a monitored application's process space that captures frames.

recording algorithm
In architecture, an algorithm that determines the relationship between the physical location and logical location of image points in image data.

recording daemon
A privileged process running on the same endpoint as the monitored application, which performs operations that require elevated privileges.

recording filter
In Tivoli NetView for OS/390, the function that determines which events, statistics, and alerts are stored in a database. See also filter.

recording format
For a tape volume, the format of the data on the tape, such as 18, 36, 128, 256, or 384 tracks.

recording instrument
An instrument that shows statistics for a system resource over a period of time.

record interface
In PSF, coordinates the transmitting of printer resources needed to print a document.

record key

  1. In COBOL, a key field whose contents identify a record within an indexed file.
  2. In RPG, all the key fields defined for the record type.

record layout
In AFP Utilities, a part of the printout format definition that defines how each field of a database file record is formatted and printed by the print format utility.

record length

  1. The total length of all the columns in a table. The record length is the length of the data as physically stored in the database. Records can be fixed or variable in length, depending on how the columns are defined. If all columns are fixed-length columns, the record is a fixed-length record. If one or more columns are varying-length columns, the record is a varying-length record.
  2. The length of storage that represents a database row or other data.

record-level access
A means of supporting distributed files. Record-level access enables an application or user to read and update individual records of files on a remote system without specifying the data's location.

record-level sharing (RLS)
See VSAM record-level sharing.

record-level specification
A data description specification coded on the same line as a record format name or on lines immediately following a record format name (until the first field is specified).

record lock
A lock that prevents some or all of a file from being written to or read.

record maintenance statistics (RECMS)
An SNA error event record that is built from an NCP or line error and sent unsolicited to the host.

record mode
In MFS, the default input mode in which fields are defined as occurring within a specific record sent from the device. See also input mode, stream mode.

record name
A user-defined name for a record. The name is listed in a record description entry.

record number
In COBOL, the ordinal number of a record in the file whose organization is sequential.

record object
An object that has been declared as a record and contains a reference to the documents and their content.

record-only mode
The operating mode in which DFSMSrmm records information about volumes as they are used, but does not validate or reject volumes. See also manual mode, warning mode.

record-oriented file
A file with a record-oriented structure that is accessed record by record. This file structure is typical of data sets on VM, MVS, and OS/400 systems. See also stream data file.

record processing pattern
A job step pattern that reads and applies business logic to one record at a time from an input data source. The job step writes the results to an output data source and repeats the steps until all input records are processed.

record resource block (RRB)

record retention period
The length of time an object, such as a record or document, must be retained before it is eligible for deletion.

records administrator
A specific security role, the duties of which include setting up security, object stores, document and record classes, and metadata.

record selection
The process of selecting particular records from a file and including the information from the records, for example, in a report.

records-enabled object store (ROS)
An object store that has been configured to allow record declaration. A record-enabled object store contains documents that can be declared as records.

record separator
In BSC, a control character used to indicate the end of one record and the beginning of another.

records management system
Any system for managing records which includes the file plan, disposition schedules, naming patterns, record classes and properties, locations, workflows, and anything else that can be created for records management.

records manager
A specific security role, the duties of which include managing records, holds, and disposition actions.

records object store
See records-enabled object store.

records retention
The policy of storing documents that are declared as records until they can be legally disposed of per their schedule. Records retention is for a specific period.

records reviewer
A specific security role, the duties of which include reviewing entities that are ready for disposition, declaring records, and performing basic record-related operations, such as filing or copying records.

records user
A specific security role, the duties of which include declaring and viewing records.

record type

  1. A categorization of records that are based on common features among the records.
  2. The classification of records in a file. Records of the same type have the same fields in the same order. For program-described files, these records have record identification codes; for externally described files, the records have the same record format name.

record volume
An object that is a logical subdivision of a record folder into a smaller, more easily-managed unit. A volume object has no existence independent of the record folder.

To rebuild data after it has been damaged or destroyed.


  1. The degree or extent to which the system can be restored to an operational condition after a system failure.
  2. The ability of a system to continue processing without loss of data when an unplanned interruption occurs.

recoverable data
Data with values that persist through system shutdowns and failures. Changes made to recoverable data are permanent regardless of system problems.

recoverable data set
A data set that can be recovered using commit, backout, or forward recovery processing. See also backout, commit, forward recovery.

recoverable error
An error condition that can be automatically corrected (for example, by retry operation) and, when corrected, allows continued processing of a job, a program, or a hardware function.

recoverable indoubt structure (RIS)
In DBCTL, an area constructed for each unit of recovery when a failure occurs. Each RIS is written to the IMS log. RIS contents include the recovery token, the changed data records, and the identity of the data block that cannot be accessed because of unresolved in-doubts.

recoverable resource

  1. A resource that can be modified only in accordance with sync point protocols.
  2. See protected resource.

recoverable resource management services (RRMS)
The set of three system components that provide resource recovery services in z/OS: resource recovery services (RRS), context services, and registration services.

Recoverable Resource Manager Services attachment facility
A DB2 subcomponent that uses Resource Recovery Services to coordinate resource commitments between DB2 and all other resource managers that also use RRS in a z/OS system.

recoverable service element (RSE)

  1. A service element (IMS) that is backed up and that can initiate a takeover.
  2. A set of DBCTL subsystem identifiers of equivalent DBCTL subsystems, their associated job names, and the specific APPLIDs of the CICS systems that will use them. RSEs are defined by CICS resource definition macros and are held in the recoverable service table (RST).

recoverable status
Any resource status that can be recovered after a terminal logoff, a user signoff, or an IMS restart.

recoverable transaction
An IMS transaction that is recovered in the event of a failure.

recover time objective
In disaster recovery planning, the length of time that a system can be offline.


  1. The process of re-creating a database or table space that became unusable because of hardware failure, software failure, or both. The process includes restoring a backup image and can also include rolling database logs forward in time.
  2. The process of rebuilding data after it has been damaged or destroyed, often by using a backup copy of the data or by reapplying transactions recorded in a log.
  3. In Backup, Recovery, and Media Services, the process of locating and restoring data in the event of partial or total data destruction. The recovery service automatically locates the correct media to be restored based on user-defined media management and recovery requirements.
  4. The process of restoring access to file system data when a failure has occurred. Recovery can involve reconstructing data or providing alternative routing through a different server.
  5. The process of returning the system to a state from which operation can be resumed.
  6. The restoration of resources following an error.

recovery authority
The person or persons who are authorized to recover IDs and to reissue new passwords to end users.

recovery control data set (RECON data sets)
A data set in which DBRC stores information about logging activity and events that might affect the recovery of databases.

recovery domain
A subset of nodes in a cluster that are grouped together for a common purpose, such as rebuilding databases after a system failure. A domain represents those nodes of the cluster where cluster resource exists.

recovery event
An event occurs when acceptable performance (or availability) is regained after a violation. See also violation event.

Recovery Guru
See fix procedure.

recovery job
A process that recovers queried capture data and forwards it to the decapper device for ingestion.

recovery key
See encryption recovery key.

recovery-level tracking
In an RSR environment, a tracking IMS that does not track the databases or areas of the active IMSs, but instead saves all database changes on tracked logs on the tracking IMS until recovery or remote takeover is performed See also database-level tracking.

recovery library
The library containing information related to recovery of database operations from system failures. Named QRECOVERY.

recovery log

  1. A log of updates that are about to be written to the database. The log can be used to recover from system and media failures. The recovery log consists of the active log (including the log mirror) and archive logs.
  2. See database log.
  3. A collection of records that describes the events that occur during DB2 execution and indicates their sequence. The recorded information is used for recovery in the event of a failure during DB2 execution.
  4. In IBM MQ for z/OS, data sets containing information needed to recover messages, queues, and the IBM MQ subsystem. See also archive log.

recovery log data set (RLDS)
A log data set that contains only the log records that are required for database recovery.

recovery manager

  1. A subcomponent that supplies coordination services that control the interaction of DB2 resource managers during commit, abort, checkpoint, and restart processes. The recovery manager also supports the recovery mechanisms of other subsystems (for example, IMS) by acting as a participant in the other subsystem's process for protecting data that has reached a point of consistency.
  2. CICS resource recovery mechanism that provides a CICS resource manager, for example file control, with more flexibility than the DWE two-phase commit support for syncpoint and backout processing.
  3. A coordinator or a participant (or both), in the execution of a two-phase commit, that can access a recovery log that maintains the state of the logical unit of work and names the immediate upstream coordinator and downstream participants.

recovery pending (RECP)
The state of a database or table space when it is restored from a backup. While the database or table space is in this state, its data cannot be accessed.

recovery point
In the CICS backup-while-open facility, the latest point, on the CICS forward recovery log series for this data set, from which forward recovery can start and restore any image copy taken at that point to a consistent state. The recovery point is held as a time that can be converted to a position on the forward recovery log.

recovery point objective

  1. The maximum amount of data loss that can be tolerated during a service interruption.
  2. In disaster recovery planning, the point at which data is restored to in the event of a disaster.
  3. The maximum tolerable time period from which data might be lost from an IBM Commerce on Cloud service due to a disaster.
  4. The acceptable amount of data lost in a period of time.

recovery policy
In Backup, Recovery, and Media Services, a policy that defines the default controls and values to be used in recovery operations.

recovery procedure

  1. The method of returning the system to the point where a major system error occurred and running the recent critical jobs again.
  2. An action performed by the operator when an error message appears on the display screen. This action usually permits the program to continue or permits the operator to run the next job.
  3. A process in which a specified data station attempts to resolve conflicting erroneous conditions arising during the transfer of data.

recovery-readiness-level database
In an RSR environment, a database or area to which database changes are not applied as they are received from the active subsystem, but instead are saved on tracked logs on the tracking subsystem until recovery or remote takeover is performed, or until the database's (or area's) readiness level is changed to database readiness level. See also readiness level.

recovery routine
A routine that is entered when an error occurs during the performance of an associated operation. It isolates the error, assesses the extent of the error, and attempts to correct the error and resume operation.

recovery site
See secondary site.

recovery system
A system that is used in place of a primary application system that is no longer available for use. Data from the application system must be available for use on the recovery system; data is usually made available through backup and recovery techniques, or through various direct access storage device (DASD) copying techniques, such as remote copy.

recovery termination manager (RTM)
A program that handles all normal and abnormal termination of tasks by passing control to a recovery routine associated with the terminating function.

recovery time objective

  1. The targeted duration of time within which a business process should be restored after a disaster is declared to help avoid consequences that are associated with a break in business continuity.
  2. In disaster recovery planning, the total time one can allow for their systems to be offline.
  3. The maximum duration of time within which an application should be restored after any type of disaster.

recovery token

  1. An identifier for an element that is used in recovery (for example, NID or URID).
  2. A 16-byte unique identifier that is created by CICS and passed to DBCTL for each logical unit of work (LUW). See also pseudorecovery token.

recovery volume
The first volume of a prime index if the Virtual Storage Access Method (VSAM) data set is a key-sequenced cluster. If the VSAM data set is entry-sequenced, a recovery volume is the first volume of the data set.

See recovery pending.

An individual who enagages in recruiting activities such as staffing and talent acquisition.

See talent acquisition.

recruiting cost
The cost associated with hiring a new individual into an organization.

recruitment management system
A software application that enables the electronic handling of recruitment needs. The system can be implemented on an enterprise or small business level, depending on the needs of the company. These systems are typically comprised of one or more candidate portal(s), a recruiter portal for candidate data mining and candidate processing, and a hiring manager portal. They generally also include candidate correspondence and interview scheduling functionality, plus ad-hoc reporting and a metrics dashboard. See also applicant tracking system.

recruitment process outsourcing (RPO)
A form of business process outsourcing (BPO) in which an employer or company uses an external service provider for recruitment processes.

Pertaining to a line style in which connections between nodes in the application diagram are drawn by using only horizontal and vertical lines.

See right-hand page.

recurring event
An event that recurs automatically after a specified time interval and is used to trigger periodic reviews of vital records.

recurring order
An order that repeats on a frequency chosen by the customer. For example, a buyer might want to purchase and have delivered two bottles of milk every week for a year.

recurring wait time trigger
A trigger that is evaluated based on a period of time. For example, a recurring wait time trigger can be evaluated every 30 minutes and fire if it detects that a specific business situation has occurred.

A programming technique in which a program or routine calls itself to perform successive steps in an operation, with each step using the output of the preceding step.

recursion cycle
The cycle that occurs when a fullselect within a common table expression includes the name of the common table expression in a FROM clause.

recursion depth
The number of links that radiate from each seed that the web crawler can traverse.

recursion level
The position of a program in a call stack. The first occurrence of a program in a job has a recursion level of 1, the second occurrence of the same program has a recursion level of 2, and so on.

Pertaining to a program or routine that calls itself after each run until it is interrupted.

recursive common table expression
A common table expression that refers to itself in a FROM clause from the fullselect. Recursive common table expressions are used to write recursive queries.

recursive level
A hierarchy structured solely in terms of parent-child relationships, for which the user can explicitly name the levels contained in the recursive relationships. See also auto-level hierarchy, level.

recursive mutex
A read/write lock that is acquired again by the owning thread.

recursive procedure
An active procedure that can be called from within itself or from within another active procedure.

recursive program
A program that can call itself, or be called by another program, and repeat indefinitely until a specified condition is met.

recursive query
A fullselect that uses a recursive common table expression.

recursive routine
A routine that can call itself or be called by another routine that it has called.

recycle process
A DFSMShsm process that, based on the percentage of valid data on a tape backup or a migration-level-2 volume, copies all valid data on the tape to a tape spill backup or migration-level-2 volume, omitting expired, deleted, or recalled data sets.


  1. To remove changes to a product's name, properties, and artifact links that a user did not mean to share. Redacting does not remove the changes from the history of the object.
  2. To block the viewing of the data that is displayed in the area under a annotation that is drawn on a document.


  1. In architecture, the process of applying an opaque mask over a page so that a selected portion of the page is visible. Because this function is typically used to prevent unauthorized viewing of data, an associated security level is also provided.
  2. An annotation type that is an opaque mask that is applied to a page so that a selected portion of the page is not visible.

red-black deployment
A deployment technique that drives continuous delivery by enabling synchronized test, development, and deployment. Initially, development is done on an inactive environment (black) while the active environment continues to take traffic (red). Once deployment starts, both environments go live (red-red) until routing is disabled on the formerly active, previous version environment, then subsequently removed (black) while the new environment serves as the only active environment. See also blue-green deployment.

redefinable line
A line that is in use and can be activated. It can be changed to a spare line using NTuneMON with NTuneNCP.

A function that triggers the already processed document to be placed on the configured destination.

The process of synchronizing a hard-disk content to its reference image stored in a hidden and protected partition.

redeployment preload
The process of creating a reference image of a computer at the end of a deployment, and saving this reference image into a protected redeployment partition. This protected partition is invisible to the user and to the operating system.


  1. To define or use a logical device name as a reference to another device or file that may be local or remote.
  2. To divert data from a process to a file or device to which it would not normally go.

redirected distribution
A method of software distribution that uses a file-distribution server.

In a shell, a method of associating files with the input or output of commands.

A change to the contract language made by either party and indicated with red lines.

redline markup
A function in Rational DOORS that highlights both inserted and deleted text.

The DEDB process in the second phase of a two-phase commit process if the chosen action is COMMIT. For DEDBs, if phase two action is COMMIT, the changes are written to the database using REDO, because the DEDB changes have only been made in main storage. If the action is BACKOUT, no changes are required to the database because the updates are still in main storage. The process applied is called UNDO. REDO is also used to refer to the action required for committed DEDBs during emergency restart of IMS, DL/I, or SQL/DS.

A state of a unit of recovery that indicates that changes are to be reapplied to the disk media to ensure data integrity.

reduced cost
The amount by which an objective function coefficient must improve (increase for maximization, decrease for minimization) before the value of a corresponding variable is positive in the optimal solution.

reduced instruction-set computer (RISC)
A computer that uses a small, simplified set of frequently used instructions for rapid processing.

reduced instruction set computer (RISC)
A computer that uses a small, simplified set of frequently used instructions for rapid processing. See also complex instruction set computer.

reduction operation
An operation, usually mathematical, that reduces a collection of data by one or more dimensions, for example, the reduction of an array to a scalar value


  1. In information analysis, a measure of the number of columns that have the same values or common domains.
  2. The use of several identical functional units, such as several disk drives or power supply systems, within one computer system in order to provide data security and a certain degree of fault tolerance in case of hardware failures.

redundancy level
For an SMC-R link group, a value that indicates the level to which z/OS Communications Server can provide dynamic failover processing if there is a failure of an underlying IBM 10GbE RoCE Express interface or the associated network hardware.

redundant ac-power switch
A device that provides input power redundancy by attaching a device to two independent power sources. If the main source becomes unavailable, the redundant ac-power switch automatically provides power from a secondary (backup) source. When power is restored, the redundant ac-power switch automatically changes back to the main power source.

Redundant Array of Independent Disks (RAID)
A collection of two or more physical disk drives that present to the host an image of one or more logical disk drives. In the event of a physical device failure, the data can be read or regenerated from the other disk drives in the array due to data redundancy. See also device parity protection, Serial Storage Architecture.

redundant array of independent memory (RAIM)
A random access memory feature that uses memory modules and striping algorithms to avoid memory operation failures.

redundant dual active controller
A software device driver, used with AIX, Solaris, Linux, Windows, and NAS 500 hosts, and the DS4000 disk subsystems, that provides multipath and load balancing capabilities.

redundant path limit
The maximum number of times identical paths may be scanned in a scan, in order to reduce scan time and eliminate duplicate results.

redundant SAN
A storage area network (SAN) configuration in which any single component might fail, but connectivity between the devices within the SAN is maintained, possibly with degraded performance. This configuration is normally achieved by splitting the SAN into two independent, counterpart SANs. See also counterpart SAN.

Pertaining to a module that is designed for concurrent execution by multiple tasks. If a reenterable module modifies its own data areas or other shared resources in any way, it must use appropriate serialization methods to prevent interference between using tasks. See also quasi-reentrant.

A situation where a thread of control attempts to enter a bean instance again.


  1. See threadsafe.
  2. The attribute of a program or routine that allows the same copy of the program or routine to be used concurrently by two or more tasks.

reentrant code
Executable code that can reside in storage as one shared copy for all threads. Reentrant code is not self-modifying and provides separate storage areas for each thread. See also threadsafe.


  1. To transform a program, for example by renaming a package or method, while preserving its behavior.
  2. To make changes across a set of artifacts without changing the behavior of the application or its relationships to other elements.

In Enterprise Service Tools, a process that propagates a file name change to all referencing artifacts when an operations file or operation within a file is renamed to prevent breaks in the project.


  1. A variable data type in which the variable's value is an address.(Sun)
  2. A module that stores required data, including categories and their code and display values, for all applications that are integrating with the Emptoris Strategic Supply Management platform.
  3. One or more objects that are grouped in a semipermanent fashion and used as a master for placement on a drawing. Instances of the reference can be placed on the drawing. When the reference definition is changed, all instances of the reference change.
  4. In VisualAge RPG, information from a physical source file that may be extracted at build time. Any changes made to the original source must be recompiled to reflect the changes at run time.
  5. In a spreadsheet, the coordinates of a cell, usually in column-row format, but can also contain a reference to a sheet within the spreadsheet, for example, A3, or Sheet1.A3
  6. Single direction, one-to-one association between a root or child component and another root component. See also link.
  7. Logical names defined in the application deployment descriptor that are used to locate external resources for enterprise applications. At deployment, the references are bound to the physical location of the resource in the target operational environment.

reference-based licensing
A software license in which charges are based on the capacity of a parent product or product family, rather than on the software product itself.

reference binding
A binding that maps a logical name (a reference) to a JNDI name.

reference bit
A bit in each page frame table entry that denotes that the corresponding page has been accessed (either read from or written to) since the last time the operating system cleared the page.

reference class
A class that links a concrete class to an abstract class. Reference classes make polymorphism possible with the collection classes.

reference code
A group of characters that identifies the machine status or a specific error condition.

reference code translation table
An object that contains reference code and field-replaceable-unit (FRU) code records. These records are used to report hardware errors and do problem analysis and resolution. The system-recognized identifier for the object type is *RCT.

reference cost
The cost used to determine the triggers in the price update process.

reference count
In an i-node, a record of the total number of directory entries that refer to the i-node.

reference delete conflict
An edit conflict that occurs when one user has deleted an object that another user has referred to or vice versa.

reference dimension
A dimensional framework that holds reference structures and templates used to provide information when merging data and delivering dimension data into data marts.

reference domain
A dimension in which the set of members is constructed from all the members in a hierarchy or lookup, regardless of whether the fact data includes them.

referenced term
A term in a business glossary that is referred to by a category instead of being contained in that category. A term can be referred to by multiple categories. A term cannot be contained by and referenced by the same category.

referenced window record
In DDS, a record containing the WINDOW keyword that identifies the name of a window definition record.

reference element
In DCF, in a general document, an element whose content is a reference to another element that is generated by an APF. There are five: figure reference, footnote reference, heading reference, index entry reference, and list item reference.

reference explorer
A utility that can be used to explore the data and structure of reference structures.

reference format
A format that provides a standard method for describing COBOL source programs.

reference frame
See information frame.

reference implementation

  1. A sample implementation that uses data such as sample organizations, users, teams, images, items, configuration models, item entitlements, and prices to demonstrate the functionality of various applications and products.
  2. An implementation by which other implementations are judged for conformance to a standard or are tested for interoperability.

reference line

  1. In Business Graphics Utility, a straight line parallel to either the vertical or horizontal axis relative to which data values are plotted on a chart. Sometimes called a translated axis line.
  2. A line that is used as a reference to position and orient drawings, objects, or symbols to be added to the active drawing. The reference line can be used to rescale the objects so that the reference line is the same length as the line on which it is placed.

reference link
An input link on a Transformer or Lookup stage that defines where the lookup tables exist. See also link.

reference map
A data record of direct mapping of a key to a value, for example, a user name to a global ID.

reference map of maps
A data record of two keys mapped to many values. For example, the mapping of the total bytes of an application to a source IP.

reference map of sets
A data record of a key mapped to many values. For example, the mapping of a list of privileged users to a host.

reference match
See two-source matching.

reference message
A message that refers to a piece of data that is to be transmitted. The reference message is handled by message exit programs, which attach and detach the data from the message so allowing the data to be transmitted without having to be stored on any queues.

reference model
In the context of Tivoli software, the model configuration for a system, or set of systems, that is used to maintain consistent configurations in a distributed environment.

reference modification
In COBOL, a method of establishing and referring to a data item by specifying a leftmost character position and length within a character string.

reference modifier
In COBOL, the leftmost character position and the length of a character string used to establish and refer to a data item.

reference monitor
In the Distributed Computing Environment (DCE), code that controls access to an object.

reference object
A shared object that is referenced within the same report, or in a different report. A reference object does not contain its own content.

reference phrase
The text that is highlighted and preceded by a single-character input field used to signify the existence of a hypertext link.

reference point
A feature instance that can be used as a start or end point for a linear segment.

reference point offset
A distance along the length of the asset measured from a previously defined reference point. For example, a speed sign is .2 miles from milepost 10.

reference price
The price that buyers use to compare the offered price of a product or service. The reference price might be a price in a buyer's memory, or the price of a similar, alternative product.

reference property
A property that points to a primary key property in a reference class.

reference repository
The local image storage that is used by the Virtual Image Library component to store the virtual images.

reference scenario
The scenario to which values in the currently-active scenario are compared.

reference set

  1. The amount of real storage required so that minimal (almost zero) virtual paging occurs. It is the total amount of real storage required to process the most frequently used sequence of instructions and data for a given set of transactions performing defined tasks, without causing any virtual storage paging operations.
  2. A list of single elements that are derived from events or flows on a network. For example, a list of IP addresses or a list of user names.

reference store
An online store that contains fully functional code for selected features of an online store, for example, auctions. Reference stores are designed to be used by store developers as code samples of the highlighted features.

reference structure
An object that helps define the dimensional framework. Reference structures include both hierarchies and lookups.

reference table

  1. A table where the data record maps keys that have an assigned type to other keys, which are then mapped to a single value.
  2. A data table that can be used in comparisons during data analysis.

reference variable
A variable that is used to hold content for report automation.

referential constraint
The requirement that the nonnull values of a designated foreign key are valid only if they are also values of the primary key of the parent table. The referential constraint is always defined from the perspective of the dependent file. See also constraint.

referential cycle
A set of referential constraints such that each table in the set is a descendent of itself. See also cycle.

referential integrity

  1. The state of a database in which all values of all foreign keys are valid. Maintaining referential integrity requires the enforcement of a referential constraint on all operations that change the data in a table where the referential constraints are defined.
  2. An analysis that is run after foreign key analysis to ensure that foreign key candidates match the values of an associated primary key.
  3. The condition that exists when all intended references from data in one column of a table to data in another column of the same or a different table are valid.
  4. In Extensible Markup Language (XML) tools, the condition that exists when all references to items in the XML schema editor or DTD editor are automatically cleaned up when the schema is detected or renamed.

referential structure
A set of tables and relationships such that for every table in the set, the set includes all relationships in which that table participates and all the tables to which it is related.


  1. A record that shows number of times a third-party business or website has referred customers to the website. Referrals can be measured for recognition purposes through various techniques including clickstream analysis, clickthrough rates, affiliate marketing services, and surveys.
  2. In the Lightweight Directory Access Protocol (LDAP), a pointer from one LDAP directory server to another.
  3. A way for servers to refer clients to additional directory servers. With referrals you can: distribute namespace information among multiple servers, provide knowledge of where data resides within a set of interrelated servers, and route client requests to the appropriate server.

referral number
The phone number to which calls are routed, when call forwarding is active.

referral rights period
The pre-determined amount of time during which a particular agency owns the rights to a candidate that it has submitted.

referral status
The source from which a candidate was referred.

referred Locate search
See referred search.

referred search
A directed search sent from a network node to a central directory server.

referring site
The domain that is gathered in the session's referring URL for sessions that are not sourced through a marketing program (cm_mmc) or a natural search engine. See also inbound link.

refined search
A focused search query that looks for specific relationships based on the user-defined search criteria. Specifically, a refined search is a Boolean search using the OR operator.

The ratio of reflected light to incident light.

reflective marker
In hardware, reflective material placed on magnetic tape to indicate the beginning or ending of the recording area.

See continuous-forms stacker.

To ensure that the information on the user's terminal screen is up-to-date.

refresh age
The time duration between the current time and the time during which a materialized query table was last refreshed.

refresh pack
A cumulative collection of fixes and new functions that moves the product up one modification level and a particular service level. For example, a refresh pack might move a product from Version 1 Release 1 Modification level 1 Fix Pack 5 to Version 1 Release 1 Modification level 2 Fix Pack 3. See also fix pack, interim fix, manufacturing refresh, test fix.

refresh rate
The rate at which the monitor is refreshed. For example, a 60 Hz monitor is redrawn 60 times per second.

refresh timer
An internal device that is triggered manually or automatically at timed intervals that updates the current network activity data.

refresh token
A string that is used to obtain a new access token when the current access token expires.

The credit amount in the currency used to place the order.

The process of copying the primary and mirror partitions of a failed disk to a spare disk.

The process of dynamically generating application code from a model. When a model is regenerated, each builder in the model executes in sequence and creates pieces of the application, such as JSP Pages or Java methods.

See regular expression.


  1. A physical instance of a CICS server.
  2. A defined geographic territory. A region could be a specific postal code area, a town, a city, a state, a group of states, or even a group of countries. Each region can itself be a set of other regions or a set of postal codes that form the region.
  3. An area within a bitmap, a pixmap, a screen, or a window.
  4. A contiguous area of virtual storage that has common characteristics and that can be shared between processes.
  5. In Sterling Order Management, a geographic or market-based zone in which a validation or override rule is applicable.
  6. In MVS, a variable-size subdivision of virtual storage that is allocated to a job step or system task. CICS Transaction Server runs in an MVS region, usually referred to as the CICS region.

region class
The class IMS assigns to a message region that indicates the message classes that can be processed within the region. See also class, message class.

region layout
A customizable area or frame, such as notice or banner sections, that surrounds the eForm in a form policy.

region level
A classification of regions into distinct categories to facilitate easier searches. Region levels such as country, state, city, or county are created based on the level at which an organization wants to aggregate its member regions.

region master
A master schedule that applies to a single region. A region masters can be created only in reference to a global master. The region master inherits the attributes of the global master and can then be customized to fit the requirements of the designated region.

region of interest (ROI)
A selected area within the view of the camera channel that is identified for specific analysis.

region of uninterest (ROU)
A selected area within the view of the camera channel that is excluded from the video analysis.

region schema
A group of hierarchical regions that represents the complete set of regions that define a given geography.

regions index
An internal, system-generated index associated with an XML column that represents how an XML document is divided into regions.

region size
The amount of main storage available for a program to run.

region status server
A coupling facility data table server into which CICS regions broadcast generic system status data which is subsequently interrogated by CICSPlex SM for making dynamic routing decisions.


  1. To define a client node or administrator ID that can access the server.
  2. In NCS, to enter an object and its location in the Location Broker database. The lb_$register call registers an object with the Location Broker. A program can use Location Broker lookup calls to determine the location of a registered object.
  3. To validate for compliance and store in the Global Registry.
  4. To add a user-written condition handler onto a routine's stack frame.
  5. In NCS, to make an interface known to the RPC run time library and, thereby, available to clients through the RPC mechanism. The rpc_$register call registers an interface.
  6. In the hierarchical file system, to make an underlying file system and the specific functions it supports known to the application programming interface layer and accessible to user applications.
  7. To insert authorization and authentication information into binding information.
  8. An internal computer component capable of storing a specified amount of data and accepting or transferring this data rapidly.
  9. In a database, to store information about user-defined database objects in the system catalog tables of a database.
  10. In SQL replication, to define a DB2 table, view, or nickname as a replication source.

registered coded graphic character set
A coded graphic character set whose graphic character set and coded character set have both been registered within IBM.

registered code page
A code page that has been registered within IBM and assigned an IBM CPGID.

registered customer

  1. A customer who is registered with a store. To register, a customer provides personal information to the WebSphere Commerce system, such as an email address.
  2. In WebSphere Commerce, a defined role that allows the reseller to shop in the marketplace. Resellers must first register in the marketplace and be approved by the seller administrator in order to attain the registered customer role.

registered device
A WiFi-enabled device that a customer has registered and provided explicit consent to have monitored.

registered enterprise-unique identifier
A name given to an entire network that makes the network unique among other networks, including IBM networks. New users are requested to register the network name with IBM if they plan to communicate with IBM networks (for PTF information, for example).

registered filter
A filter that allows more than one active filter for alerts and problem logs. When a filter is registered, the system can send notification of events to a data queue. Registered filters behave slightly different than filters exposed through the network attributes or system value commands.

registered graphic character set
A graphic character set that has been registered within IBM and assigned an IBM GCSGID.

registered network ID
An 8-byte name included in an IBM-maintained worldwide registry that has a structured format and is assigned to a particular IBM customer to uniquely identify a specific network.

registered state change notification (RSCN)
A switch function that allows notification of fabric changes to be sent from the switch to specified nodes.

registered user

  1. An authorized user of a licensed program who is recorded in a registry (for example a table, directory, or file) maintained by the customer.
  2. A portal user who has a user ID and password for logging in to a portal. See also anonymous user, authenticated user.

register save area (RSA)
The area of main storage in which the contents of registers are saved.

register variable
A variable defined with the register storage class specifier. Register variables have automatic storage.

registrable resource
A logical unit that can be registered with a network node server, a central directory server, or both a network node server and a central directory server.


  1. In Resource Recovery Services (RRS), the definition of a resource manager to the system.
  2. In X.25, the process used between a DTE and a DCE to establish an agreement on which optional user facilities will be in effect. For example, the DTE can request that the DCE agree to or stop a previous agreement for an optional user facility. Also, a DCE can indicate which optional user facilities are available or which optional user facilities are currently in effect. The negotiation is accomplished through the exchange of registration packets.
  3. In SQL replication, the process of registering a DB2 table, view, or nickname as a replication source. See also subscription.
  4. The process of registering a database extension so that its code is available to use in a particular database.
  5. The creation of an object in the network installation database that uniquely identifies a client, network, or resource in the network installation environment to the master server.
  6. In Cloud/SaaS offerings, the process during which a user signs up for an account on a application or service.
  7. In OSI, the process of obtaining identifiers for objects from the appropriate naming authorities. Registered identifiers should be obtained for the following objects, which relate to OSI Communications Subsystem operations: (a) NSAP addresses, (b) DTE addresses, (c) abstract syntaxes, (d) application contexts, and (e) application entities.
  8. In printing, the relative print positions of images that are printed at different times. For example, when preprinted forms are used, the registration is good if the new image printed by the printer aligns correctly with the preprinted image. Print that extends beyond box edges and text that overlaps other text are examples of poor registration.
  9. The process of requesting an account.

registration authority
A trusted third-party organization or company that verifies requests from individuals for a digital certificate and tells the certificate authority (CA) to issue it.

registration facility
A service that provides storage and retrieval operations for i5/OS and non-i5/OS exit points and exit programs.

registration facility repository
The repository that contains information about the i5/OS and non-i5/OS exit points and exit programs.

registration file

registration mark
In the IBM 3800 Printing Subsystem, a standard mark printed above the print contrast mark for sensing by the printer to verify that the paper registration is correct.

registration process
In replication, the process of defining a replication source.

registration service

  1. The z/OS system component that enables a resource manager to register itself with the system and identify the exit routines it provides for resource recovery.
  2. In the Tivoli common agent services, the service provided by the agent manager to validate and process requests for X.509 certificates from common agents and management applications. It functions as a registration authority.


  1. A database where services are enrolled along with a pointer to each service.
  2. A repository that contains access and configuration information for users, systems, and software.
  3. A public or private repository that contains images used to create containers. See also container, image.

registry database
In a z/OS environment, a database of security information about principals, groups, organizations, accounts, and security policies.

Registry Editor
In Windows systems, the program that allows the user to edit the registry.

registry hive
In Windows systems, the structure of the data stored in the registry.

registry scanner
Software that searches the registries for and retrieves information on installed software products and patch status.

registry service
An integration service for Jazz for Service Management that provides a shared data repository for products in an integrated service management environment.

A statistical technique for estimating the value of a target field based on the values of one or more input fields. See also linear regression, logistic regression.

regression tree algorithm
A tree-based algorithm that splits a sample of cases repeatedly to derive homogeneous subsets, based on values of a numeric output field. See also Chi-squared Automatic Interaction Detector algorithm.

regular aggregate
A single aggregate function, used by default to aggregate data across all dimensions of the transformation model. See also aggregate rule, multidimensional aggregation, multilevel aggregation.

regular array
In FD:OCA, an array in which all partitions of any dimension have the same number of subpartitions. The individual elements of a regular array might or might not have identical format and length.

regular command
A command processed by a regular command processor. Regular commands can run concurrently with other regular commands and can be interrupted by immediate commands. Most commands and all command lists are regular commands. See also immediate command.

regular database
A mailing database containing contact data. Regular databases can be larger than test lists and they contain data not found in seed lists. See also test list.

regular expression (regex)

  1. A string containing wildcard characters and operations that define a set of one or more possible strings. See also literal string.
  2. A mechanism for selecting specific strings from a set of character strings.
  3. A set of characters, meta characters, and operators that define a string or group of strings in a search pattern. See also Perl-compatible regular expression.

regular expression annotator
A software component that detects entities or units of information in a text document, such as product numbers, based on regular expressions that describe the exact patterns that are searched in the document text. If one of the regular expressions matches parts of the document text, the regular expression annotator creates the corresponding annotations that cover the match or part of it. These annotated expressions are then stored, either in the enterprise search index using an index mapping file, or a JDBC-capable database using a database mapping file.

regular file
A file that is a randomly accessible sequence of bytes, with no further structure imposed by the system. [POSIX.1]

The process of normalizing name tokens and adding those normalized names to a data list. See also data list, name token.

regular table space
A table space that stores persistent data in either database-managed space or system-managed space but that has a smaller space limit than that of a large table space. See also permanent table space.

regular time series
A set of time-stamped data where the measurements occur regularly at predictable times. The interval between measurements is identical. Electricity usage measured by smart meters every 15 minutes is an example of a regular time series. See also irregular time series, time series.


  1. In a blockchain, the person who enforces the rules of the network.
  2. A legal body that has jurisdiction within a defined area of responsibility; for example, banking, commerce, or medical.

regulatory compliance report
A report of issues found on a web application that do not comply with a selected regulation or legal standard. The regulations include legal Acts, Bills, and Laws of Canada, EU, Japan, UK, USA, and regulations of MasterCard and Visa. Custom regulatory compliance report templates can also be created.

An individual who expressed interest in employment with a specific company for whom they have worked in the past.

The actions that occur within the cluster when a node that had previously detached from the cluster returns to the cluster. These actions are controlled by the event scripts and, when necessary, by manual intervention.

Reinventing Education
A grant program that involves IBM partnerships with schools throughout the world to develop and implement innovative technology solutions.

See reject.

reject (REJ)
In communications, a data link command or response used to request the resending of information frames.

Pertaining to a status condition that describes a node that the clustered-system software has removed from the working set of nodes in the clustered system.

rejected transaction
A transaction that contains one or more updates from replica tables that are in conflict with the master table.

reject file
A text file in which records that the engine rejects are stored. In these files, each rejected record has the reason for rejection as its first field.

The identification of an utterance as one not allowed by a grammar.

rejection code
A code assigned when a score cannot be derived. Typically, one reject code per scorecard only is assigned.

rejection reason
A code that identifies the specific reason an offer in the negotiation process is not accepted.

reject link
An output link that identifies errors when the stage is processing records and that routes those rejected records to a target stage. See also link, output link.

To become an active member of an entity after having been a nonparticipating member.

Related Communities app
An app that provides a way to link to from one community to another community of interest.

related default CCSID table
A table containing a default CCSID associated with another CCSID and an ESID. This default CCSID is considered to be the nearest equivalent of its associated CCSID based on some relationship between the two.

related item
An item that is associated with another item as an accessory or required part, but is sold separately. For example, if a customer buys a camera, the store may offer the option to buy a carrying case or batteries. The carrying case and the batteries are related items for the camera.

related product
A product that is associated with another product by way of a predefined relationship.

related report
A tabular report that displays additional, and in some cases nonmetric, data for a metric report.

related term
A term in a business glossary that is related to the term in question. This relationship can be used for "see also" relationships to terms that are similar but not identical. The relationship is symmetrical; that is, if you specify that term A has term B as a related term, then term B has term A as a related term. A term can have multiple related terms.

related view
A view that uses, or is dependent on, another object, such as the parent view of a table.

An unordered flat collection class that uses keys, allows for duplicate elements, and has element equality.

relational character
In COBOL, one of the characters that express a relationship between two operands: equal to, greater than, less than.

relational checking

  1. The evaluation of the operands in a relational expression, based on the relational operator used.
  2. In RPG, tests performed against two statements in a source program to ensure that the statements are valid (for example, a GOTO operation must have an associated TAG operation). This type of checking is done only by the compiler as opposed to single-statement syntax checking that is done by the SEU function.

relational condition

  1. In COBOL, a condition that relates two arithmetic expressions, data items, or both.
  2. A condition that relates two fields such that one is invalid unless the other is present.

relational cube
A set of data and metadata that defines a multidimensional database. A relational cube is the portion of a multidimensional database that is stored in a relational database.

relational data
Data stored in a relational database management system (DBMS).

relational data access model
A data access model that is a subset of a relational database model.

relational database (RDB)

  1. A database that can be perceived as a set of tables and manipulated in accordance with the relational model of data. Each database includes a set of system catalog tables that describe the logical and physical structure of the data, a configuration file containing the parameter values allocated for the database, and a recovery log with ongoing transactions and archivable transactions.
  2. A database that can be perceived as a set of tables and manipulated in accordance with the relational model of data.

relational database management system (RDBMS, RDMS)
A collection of hardware and software that organizes and provides access to a relational database. See also Data Definition Language.

relational database model
An object that contains a schema-based definition of entities within a relational database. A relational database model includes the names of all the tables, columns, keys (primary and foreign), indexes, and other related entities within the relational database.

Relational Data Services (RDS)
The component of the DB2 database manager that processes requests to access or manipulate the contents of a database. For SQL requests, RDS processing involves translating statement text into an executable section, running that section, and returning the result set to the requester.

relational expression
A logical statement that describes the relationship (such as greater than or equal to) of two arithmetic expressions or data items.

Relational-Functional Markup Language (RFML)
An XML application for declarative programming and knowledge representation.

relational graph
A method of displaying elements to get an overview of the folder and element structure of a view.

relational marker
A term that is included in a personal name that indicates a familial relationship between individuals. For example, in the name "Karim bin Hassan," the relational marker "bin" means "son of."

relational operator

  1. Any of the set of operators that express an arithmetic condition that can be either true or false. The operators are: .GT., .GE., .LT., .LE., .EQ., and .NE.. They are defined as greater than, greater than or equal to, less than, less than or equal to, equal to, and not equal to, respectively.
  2. An operator that compares two operands and yields a Boolean value.
  3. The reserved words or symbols used to express a relational condition or a relational expression.
  4. In COBOL, a reserved word, a relational character, a group of consecutive reserved words, or a group of consecutive reserved words and relational characters used to express a relational condition.

relational schema
See SQL schema.

relational table
A database that can be perceived as a set of tables and manipulated in accordance with the relational model of data. This database contains indices that create a one to many relationship between data in one file and data in many other files.


  1. In Metro Mirror or Global Mirror, the association between a master volume and an auxiliary volume. These volumes also have the attributes of a primary or secondary volume. See also auxiliary volume, master volume, primary volume, secondary volume.
  2. A property that serves as a link between two contracts or between two external organizations.
  3. A link between two or more entities. Relationships can be based on links discovered by the system, disclosed by an analyst, or both. See also degrees of separation, entity, relationship path.
  4. A defined connection between the rows of a table or the rows of two tables. A relationship is the internal representation of a referential constraint.
  5. A semantic connection among model elements. Examples of relationships include associations and generalizations.
  6. An association between business glossary assets.

relationship attribute
An attribute instance that references another attribute for an item that exists in a different catalog. Even if the primary key of the target entry is changed, the two entries are still associated with each other. See also link attribute.

relationship-dependent master data
Master data that concerns all terms that are communicated between trading partners, like marketing conditions, prices and discounts, and logistics agreements.

relationship group
A set of relationships between XBRL concepts.

relationship instance
The runtime instantiation of the relationship. The relationship definition is a template for the relationship instance.

relationship management application (RMA)
An application used to manage authorizations. Among other things, it converts bootstrap authorizations created by WebSphere BI for FN into the RMA authorizations required to satisfy FIN PV03.

relationship management data store (RMDS)
A set of database tables in which WebSphere BI for FN stores data about bootstrap and relationship management application (RMA) authorizations.

relationship manager
A tool for creating and manipulating relationship and role data at run time.

relationship path
A chain of relationships that connects the inbound identity to the entity that it was resolved to. See also relationship.

relationship resolution
See entity resolution.

relationship role
In EJB programming, a traversal of the relationship between two entity beans in one direction or the other. Each relationship that is coded in the deployment descriptor defines two roles.

relationship rule
A rule that is contained in a configuration item (CI) space and defines the relationships among authorized CIs created by the promotion process.

relationship score
A value that is assigned during entity resolution as a result of applying the resolution rules and that defines how closely the two compared identities are related to each other. See also resolution score.

relationship service
A service used to model and maintain relationships across business objects and other data

relationship type
A type used to define a relationship and its direction between nodes.

relative address

  1. An address specified relative to a base address. See also absolute address.
  2. An address counted relative to a symbol. When a program is relocated, the addresses themselves change, but the relative addresses remain the same.

relative byte address (RBA)
The offset of a data record or control interval from the beginning of the storage space that is allocated to the data set or file to which it belongs.

relative coding
Coding that uses machine instructions with relative addresses. (A)

relative coordinate
One of the coordinates that identify the position of an addressable point with respect to some other addressable point. See also absolute coordinate.

relative data
In Business Graphics Utility, values in a computer image that specify points relative to other points in the image.

relative directory
A directory whose name begins with a ./ (dot and a slash).

relative distinguished name (RDN)

  1. The first component of the distinguished name (DN). For example, if the entry's DN is cn=John Doe,ou=Test,o=IBM,c=US, the RDN is cn=John Doe.
  2. The part of an object name that is an attribute of the object itself.
  3. In the DCE X/Open Directory Service (XDS), a set of Attribute Value Assertions (AVAs), each of which is true, concerning the distinguished values of a particular entry.
  4. An entity that builds the CA certificate name.

relative end position
In RPG, an entry on the output specifications that indicates the number of blank positions that are to appear between a field or constant defined on one specification line and the field or constant defined on the preceding specification line. See also exact end position.

relative file number
In the DDS for a join logical file, a sequential number assigned to a physical file based on the position of that file on the JFILE keyword specification.

relative host name
The specific subname of a fully qualified host name. For example, smith is a relative host name for smith.endicott.ibm.com.

relative key
In COBOL, an unsigned number that can be used directly by the system to locate a record in a file.

relative line
In architecture, a straight line developed from a specified point by a given displacement.

relative metrics
Measurement information that is defined in relation to some other units. Relative values are expressed as fractional parts of a unit-square design space (em square), whose sides correspond to the vertical size of the font. See also bounded-box relative metric, character set metric, fixed metrics, font metric.

relative move
In architecture, a method used to establish a new current position. Distance and direction from the current position are used to establish the new current position. The direction of displacement is inline along the I-axis in the I-direction, or baseline along the B-axis in the B-direction, or both.

relative-name format
A print descriptor naming convention that uses group alias names instead of system-specific (actual) group names.

relative organization
In COBOL, the file organization in which each record is uniquely identified by a positive number value that specifies the position in the file relative to the first record.

relative path
A path that begins with the current working directory. See also absolute path.

relative path name
A string of characters that is used to refer to an object and that starts at some point in the directory hierarchy other than the root. The starting point is frequently a user's current directory. See also absolute path name.

relative positional pattern
In REXX, the part of a parsing template that uses a plus or minus sign to indicate movement relative to a previous pattern match.

relative positioning
The positioning of an element of an overlay with respect to the last position established by the last position command. See also absolute positioning.

relative record data set (RRDS)
A type of Virtual Storage Access Method (VSAM) data set whose records have fixed or variable lengths, and are accessed by relative record number.

relative record number (RRN)
A number that expresses the location of a record in relation to a base position in the file containing it.

relative-size pie
In Business Graphics Utility, a piece on a pie chart drawn proportionally to another piece.

relative start generation
An indicator of the generation level of a tape. Relative-start-generation zero is the latest generation of a tape; relative-start-generation -1 is the previous generation of that tape; relative-start-generation -2 is the generation before the previous one.

relative time
In the Distributed Computing Environment (DCE), a discrete time interval that is usually added to or subtracted from an absolute time.

relative type name
The name of a type relative to another type. Relative type names are used when defining components, syntax items, and comment types.

In operations research, a loosening of constraints, usually to find a solution that may not be the optimal feasible solution of the original problem but a solution that is good enough in some sense. For example, in a mathematical programming problem expressed as integer variables, to allow floating-point solutions that are sufficiently close to integer solutions. See also conflict.

A client that is running special server software. Relays spare the server and the network by minimizing direct server-client downloads and by compressing upstream data.

relay agent
A program that delivers Dynamic Host Configuration Protocol (DHCP) packets to a local system.

relay node
See relay open system.

relay open system
In OSI architecture, an open system that forwards data received from one open system to another open system. (T) See also adjacent destination node.

relay program
In transaction routing, a CICS program that provides the communication mechanism between a locally-connected terminal and a transaction in a remote system. The relay program is invoked by the relay transaction.

relay servers
A proxy that can be used to access agents behind a firewall. Relay servers enable network-to-network communication.

relay transaction
In transaction routing, a CICS transaction that handles communication between a locally-connected terminal and a transaction in a remote system. The relay transaction invokes the relay program.


  1. The third level in the software hierarchy, located between version and variation. A version of a product can have multiple releases, and a release of a product can have multiple variations. See also software hierarchy, variation, version.
  2. To remove suspend criteria from an item. A suspended item is released when the criteria have been met, or when a user with proper authority overrides the criteria and manually releases it.
  3. A collection of applications that are deployed together. An application can be part of any number of releases.
  4. A distribution of a new product or new function and authorized program analysis report (APAR) fixes for an existing product. The first version of a product is announced as release 1 modification level 0. See also resource takeover.
  5. A distribution of a new product or new function and authorized program analysis report (APAR) fixes for an existing product. The first version of a product is announced as release 1 modification level 0. See also modification level.
  6. In a WebSphere Commerce store, a set of products in a given order that have the same ship-to address, ship time, shipping method, fulfillment center, and shipping carrier. See also packing slip.
  7. In VTAM, to relinquish control of resources (communication controllers or physical units). See also acquire.
  8. To send changed files from the workbench to the team server so that other developers on the team can catch up (synchronize) with the updated version.

release character
The character that indicates that a separator or delimiter is to be used as text data instead of as a separator or delimiter. The release character must immediately precede the delimiter.

release date
The date when notice is sent to the warehouse to start the shipping process for an order.

released state
The state of a connection that results in a disconnect of the connection at the next commit operation. See also held state.

released version status
The status of the most recently checked-in major version. Only a major version can have the status Released, and a version series can have only one released version.

release lever
A part that unlocks the device so it can be pulled out of the rack on the slides.

Release Link Trunk (RLT)
A custom specification from Nortel for ISDN call transfer.

release notice
An email that advises custodians to release documents and information back into their normal retention and destruction schedules. The notice informs custodians that they are no longer obliged to fulfill the preservation, collection, and virtual interviews that are part of a particular legal request.

release number
The release level of a program, which is an indicator of changes to the external programming interface of the program. See also modification number.

release owner
A user who oversees the process of carrying out a release. The release owner is typically the release manager who creates a release, but ownership can be transferred to another release manager.

release PO
See release purchase order.

release-program-device operation
An operation that makes a program device not available for input/output operations. See also acquire-program-device operation.

release purchase order (release PO)
A purchase order for a portion of the total amount or lines specified on an associated volume contract.

A user role that is responsible for validating answers and deciding if an assessment can be delivered.

release token
In OSI, the token that controls the orderly release of an association.

release wave
A transaction that opens picking tasks for a wave.

BigFix query language used to determine the applicability of a piece of content to a given endpoint. Relevance asks yes or no questions and evaluates the results. The result of a Relevance query determines whether an action can or should be applied. Relevance is paired with Action Script in Fixlets.


  1. A method of analysis that is used to determine how each document best matches a search query. This method relies on term weighting, term proximity, and other criteria.
  2. A measure of relative impact of an event, category, or offense on the network.

A measurement of the ability of a system to continue processing without failure. Shutting down an on-line system to process batch updates to the database reduces its availability to end users but has no bearing on the reliability of components required to deliver the online service.

reliability, availability, and serviceability (RAS)
A combination of design methodologies, system policies, and intrinsic capabilities that, taken together, balance improved hardware availability with the costs required to achieve it. Reliability is the degree to which the hardware remains free of faults. Availability is the ability of the system to continue operating despite predicted or experienced faults. Serviceability is how efficiently and nondisruptively broken hardware can be fixed. See also RAS attribute, RAS granularity.

reliable connected queue pair (RC QP)
A logical connection between two virtual servers that enables that specific pair of servers to use RDMA communications between themselves.

reliable messaging
The execution of a transport independent, SOAP-based protocol that provides quality of service in the reliable delivery of messages.

reliable multicast messaging (RMM)
A high-throughput low-latency transport fabric designed for one-to-many data delivery or many-to-many data exchange, in a message-oriented middleware publish/subscribe fashion. RMM uses the IP multicast infrastructure to ensure scalable resource conservation and timely information distribution.

Reliable Scalable Cluster Technology (RSCT)
A set of software components that together provide a comprehensive clustering environment for various platforms, including the AIX and Linux operating systems. RSCT is the infrastructure used by a variety of IBM products to provide clusters with improved system availability, scalability, and ease of use.

reliable stream delivery
A type of packet delivery that allows an application program on one machine to connect to an application program on another machine. The stream actually contains many packets of data that are sent one at a time to the receiving machine.

reliable transfer server (RTS)
In OSI X.400, a portion of X.400 that is responsible for creating and maintaining application associations and for reliably transferring distributions between message transfer agents.

reload function
In PSF, the Resource Exit can request that a resource be "reloaded." PSF will not use an existing version of the resource but will load the resource from a host library.


  1. Attribute of a set of codes whose address constants can be altered to make up for a change in origin.
  2. Pertaining to a value, expression, or address that does not have to be changed when the program is relocated.

See migrate.

See ring error monitor.

remainder page
A page that accommodates subsequent bytes of a long data row. If the trailing portion of a data row is less than a full page, it is stored on a remainder page. After the database server creates a remainder page for a long row, it can use the remaining space in the page to store other rows.

A programming language, descendant of the C language combined with traces of JavaScript and Java.


  1. In an AIX PowerSC environment, the corrective steps to take when the attestation process reports that one or more collectors are not trusted.
  2. A suggestion for how to fix an issue.

remediation process
A process of assigning, tracking, and fixing vulnerabilities that have been identified on an asset.

A commonly used tool for ticket/help desk case tracking in maintenance/support projects.

The process of returning to a current release of a DB2 database system following a fallback to a previous release. This procedure constitutes another migration.


  1. For hierarchical storage management products, pertaining to the origin of migrated files that are being moved. See also local.
  2. Any object that is maintained by a remote DB2 subsystem (that is, by a DB2 subsystem other than the local one). A remote view, for example, is a view that is maintained by a remote DB2 subsystem. See also local.
  3. Pertaining to a system, program, or device that is accessed through a communication line. See also link-attached.

Remote Abstract Window Toolkit for Java
An implementation of the Abstract Window Toolkit (AWT) that allows Java applications to run on a host system that does not have a graphical user interface (GUI). The server does not support locally attached graphic workstations; therefore, Remote AWT is necessary to allow graphical Java applications to run on the server.

remote access
In computer networking, communication with a data-processing facility by means of a data link.

Remote Access Dial-In User Service
A server that authenticates a user's password and identification before sending the information on to an Internet Service Provider (ISP) server. The server also maintains accounting records of network usage for separate users. TCP/IP services and applications, such as Point-to-Point Protocol (PPP), can rely on a RADIUS server for authentication and accounting functions.

Remote Access Service
Windows NT software that provides network capabilities over a modem link and contains functions that support point-to-point wide area network connections. For i5/OS, this includes both outgoing (originator) and incoming (receiver) point-to-point profile types and other services such as Remote Access Dial-in User Service (RADIUS) and Dynamic Host Configuration Protocol (DHCP) client configuration. Operations Console requires Windows NT users to have Remote Access Service.

remote agent
In OSI, an agent process on a remote node. See also local agent.

remote agent site
An agent site that is located on the same computer as the control server. A remote agent site requires the installation of IBM DB2 Warehouse Manager Standard Edition. See also agent site, default agent site.

remote alarm indication (RAI)
A remote alarm (also referred to as a yellow alarm) indicates that the far end of a T1 connection has lost frame synchronization. The Send RAI system parameter can be set to prevent DirectTalk from sending an RAI

remote application entity
In OSI, an application entity on a remote node.

remote application process
In OSI, an application process on a remote node. See also local application process.

remote artifact
A reference to an entity that represents an output of a development process that can be reused throughout an organization. Examples include code snippets, programs, reusable Java classes, or collections of common functions.

remote asset
An asset that references an item in another repository and that stores metadata, such as attributes and categories.

remote association
In VTAM CMIP services, the association between application entities in different nodes. See also association.

remote authentication dial-in user service (RADIUS)
An authentication and accounting system that uses access servers to provide centralized management of access to large networks.

remote bridging
The function of a bridge that allows two bridges to connect multiple LANs using a telecommunication link. See also local bridging.

remote bus adapter
A bus adapter in an expansion unit. Optical cables from the local optical link cards in the system plug into this card.

remote catchup
In high availability disaster recovery, the process of shipping logs from the primary database's log disk to the standby database. See also assisted remote catchup.

remote catchup pending state
In high availability disaster recovery, the state in which remote catchup is waiting to start. This state occurs because the primary and standby databases are not connected yet or scanning of the standby database's local log files, including those from its log archive, has not finished. See also peer state.

remote change management server (RCMS)
In retail communications and Point-of-Sale Utility, a store controller program communicating over an SNA/SDLC network that connects a host processor and a store controller. RCMS allows the NetView Distribution Manager program to access point-of-sale controller files. It also provides error reporting and recovery for failures and data format conversion for files.

remote connection
A communications link between the local system and a system or device located on another network, or at a distant site.

remote console

  1. An Operations Console configuration that allows a personal computer to dial into a local console to gain console access to the system. See also Operations Console.
  2. A display device that qualifies as a system console but is not directly attached to a system. See also local console.

remote console function
In the NetView/PC program, the function that allows one PC to control another PC.

remote control
A tool that enables the presenter to control applications on a participant's computer.

remote controller
A device or system, attached to a communications line, that controls the operation of one or more remote devices. See also local controller.

remote control panel
A graphical interface that is provided by Operations Console that allows control panel operations to be performed from a remote location. This interface allows personal computer access to the control panel that controls operating or servicing the system.

remote copy

  1. A storage-based disaster-recovery and workload-migration function that can copy data in real time to a remote location. See also Peer-to-Peer Remote Copy.
  2. See Global Mirror.
  3. See Metro Mirror.

remote database

  1. A shared database that is accessed by a program running on a different computer. The shared database is considered remote with respect to the program accessing it.
  2. A database to which a connection is made by using a database link, while connected to a local database. See also local database.

Remote Desktop Protocol (RDP)
A protocol that facilitates remote display and input over network connections for Windows-based server applications. RDP supports different network topologies and multiple connections.

remote destination
In an MSC network, a destination that resides in a remote system. See also local destination.

remote device
A device that is attached to a processor using a communication line. See also local device.

Remote Direct Memory Access (RDMA)

  1. A communication technique in which data is transmitted from the memory of one computer to that of another without passing through a processor. RDMA accommodates increased network speeds.
  2. A high-speed, low-latency network communications protocol in which data is transferred directly to the memory of a remote host with no involvement from the remote host processors or operating system.

Remote Directory Access
In OSI, the process of accessing directory information that resides on a remote open system.

remote directory service
In OSI, the service that enables a system to obtain directory service from another system. In OSI Communications Subsystem, remote directory service requires the availability of a directory system agent (DSA) from which a directory user agent can obtain directory services using the X.500 directory access protocol (DAP).

remote directory system agent
In OSI, an application process on a remote node that provides directory service.

remote distribution
In a Tivoli environment, a distribution to target machines in a connected Tivoli Management Region.

remote DL/I
A special case of function shipping, in which CICS sends a DL/I request to another CICS system.

remote equipment
The modem and controller that provides the communications connection between a communications line and a remote device or system. This remote equipment is at the other end of a data link from the host system.

Remote Execution and Access (RXA)
A type of service access point used to communicate with the Tivoli common agent and target endpoints.

Remote Execution Protocol (REXEC)
A protocol that allows the execution of a command or program on any host in the network. The local host receives the results of the command execution.

remote extension (RE)
An E1 signaling protocol similar to FXS loop start.

remote fabric
In Global Mirror, the storage area network (SAN) components (switches and cables) that connect the components (nodes, hosts and switches) of the remote clustered system.

remote federator
In an enterprise search application, a server object created by the search and index APIs that enables users to search a set of heterogeneous collections and obtain a unified set of search results.

remote file system
A file system residing on a separate server or operating system.

remote file transfer instance
A file that contains information about the method used for remotely transferring a file.

remote function call (RFC)
An interface that allows non-SAP and SAP applications to execute SAP functions that have been RFC-enabled.

remote hardware control
Management server control of cluster node hardware.

remote home interface
In enterprise beans, an interface that specifies the methods used by remote clients for locating, creating, and removing instances of enterprise bean classes. See also local home interface.

remote host
Any host on a network except the host at which a particular operator is working.

remote input/output (RIO)
A type of hardware architecture that facilitates faster input/output connection speeds between a system and expansion units. See also high-speed link.

remote interface
In EJB programming, an interface that defines the business methods that can be called by a client. See also home interface.

remote I/O enclosure
An IBM Director managed object that represents an expansion enclosure of Peripheral Component Interconnect-X (PCI-X) slots, for example, an RXE-100 Remote Expansion Enclosure. The enclosure consists of one or two expansion kits.

remote IPL (RIPL)
The initial program load of a remote requester by a server on which the appropriate program code is located.

remote job entry (RJE)
The submission of a job through an input unit that has access to a computer by means of a data link.

remote job processing (RJP)
A facility that permits the input, processing, and output of jobs to and from terminals remote from the installation.

remote job tracking
The function of tracking jobs on remote processors connected by network links to a controller. This function enables a central site to control the submitting, scheduling, and tracking of jobs at remote sites.

remote journal network
An i5/OS environment that includes a primary system source journal and target system journals. The target system journals, associated by using the remote journal function, are downstream from the primary system source journal.

remote key management server (RKM server)
A server that is used to store master encryption keys.

remote location name
Any other system with which a user's system can communicate in a network. This corresponds to the remote location name specified in the communications configuration. Equivalent to an SNA remote logical unit name. See also local location name.

remote logical terminal
An IMS queue associated with an MSC logical link to allow routing of asynchronous output messages to the local LTERM in another IMS. See also logical terminal.

remote logical unit (remote LU)
A logical unit that resides on a remote system. See also local logical unit, partner logical unit.

remote login
The initiation of a session on a system that is accessed through a communications line.

remote LU
See remote logical unit.

remote manager
In OSI, a managing process on a remote node. See also local manager.

remote MAS
A managed application system (MAS) that uses MRO or LU 6.2 to communicate with the CICSPlex SM address space (CMAS) that controls it. A remote MAS may or may not reside in the same MVS image as the CMAS that controls it.

remote memory buffer (RMB)
Local memory that is used to receive inbound data over an SMC-R link. The remote peer places TCP socket application data directly into the RMB that the local peer assigns to receive data for the TCP connection. The local peer then copies the data from the RMB into the receive buffer of the receiving socket application.

remote messaging, remote support, and web applications pattern
A reusable deployment environment architecture for IBM Business Process Management products and solutions in which the functional components of the environment (messaging, support, web-based components, and application deployment) are split across four clusters.

remote messaging and remote support pattern
A reusable deployment environment architecture for IBM Business Process Management products and solutions in which the functional components of the environment (messaging, support, web-based components, and application deployment) are split across three clusters. Web-based components reside on the support or the application-deployment cluster.

remote method
A business method in the remote interface that is callable by a client. See also Remote Method Invocation.

Remote Method Invocation (RMI)
A protocol that is used to communicate method invocations over a network. Java Remote Method Invocation is a distributed object model in which the methods of remote objects written in the Java programming language can be invoked from other Java virtual machines, possibly on different hosts. See also remote method.

Remote Method Invocation over Internet InterORB Protocol (RMI/IIOP)
Part of the Java Platform, Standard Edition (Java SE) model that developers can use to program in the Java language to work with RMI interfaces, but use IIOP as the underlying transport.

remote mirror and copy
A feature of a storage server that constantly updates a secondary copy of a logical volume to match changes made to a primary logical volume. The primary and secondary volumes can be on the same storage server or on separate storage servers. See also Global Copy, Global Mirror, Metro Mirror.

remote mirroring
The process of replicating a volume onto a remote system.

remote mode

  1. A Java Client Application using a Gateway network protocol to connect to the Gateway daemon. See also local mode.
  2. A J2EE resource adapter that has been configured with a ConnectionURL starting tcp://, http://, or ssl://. Such resource adapters communicate with the Gateway daemon.

remote modem self-test (RST)
A check on hardware to identify a field-replaceable unit that is failing.

remote name server

  1. In TCP/IP, the function that allows a system to get an internet address from a remote site rather than from its own host table.
  2. A name server that exists outside a local network.

remote network address
In OSI, a network address that identifies a remote node.

remote node

  1. In OSI, any node other than the local node. See also local node.
  2. See also secondary node.
  3. A node in the cluster other than the local node. See also cluster node.

remote NSAP
In OSI, a service access point in the network layer of a remote node.

Remote OSE
A transport mechanism that is based on the Open Servlet Engine (OSE) protocol and is used to communicate between two separate machines in the application server environment.

remote PC
In the NetView/PC program, the PC that runs the local PC, which has had its keyboard locked by means of the remote control function. See also local PC.

remote presentation address
In OSI, a presentation address of an application entity on a remote node. See also local presentation address.

remote primary Domino directory
In a central directory architecture, a primary Domino Directory that a server with a Configuration Directory uses remotely.

remote printer queue
The name of a printer queue on a remote system. For a remote system running i5/OS, this is the name of an output queue on the remote system.

remote printing
The ability to interchange print data and controls across different computing environments with the intent of printing the data on a different system from where the print request was generated. For example, in host-to-LAN distributed printing, data that resides on the host is printed on printers attached to a local area network (LAN).

Remote Procedure Call (RPC)
A protocol that allows a program on a client computer to run a program on a server.

Remote Procedure Call runtime library (RPC runtime library)
Reestablishing a communications channel for making remote procedure calls after that channel has been closed.

remote processor
A processor connected to the Tivoli Workload Scheduler for z/OS host processor through a network. A Tivoli Workload Scheduler for z/OS event writer and an event transmitter are installed on the remote processor and transmit events to the Tivoli Workload Scheduler for z/OS host processor through the network link.

remote process server
A remote system that is designated for running native operating system commands and executable programs.

remote product installation
A product installation onto a remote workstation that has a pre-installed operating system.

remote queue
A queue that belongs to a remote queue manager. Programs can put messages on remote queues, but they cannot get messages from remote queues. See also local queue.

remote queue manager
A queue manager to which a program is not connected, even if it is running on the same system as the program. See also local queue manager.

remote queue object
An IBM MQ object belonging to a local queue manager. This object defines the attributes of a queue that is owned by another queue manager. In addition, it is used for queue-manager aliasing and reply-to-queue aliasing.

remote queuing
In message queuing, the provision of services to enable applications to put messages on queues belonging to other queue managers.

remote request
A request issued from an agent at one database partition to an agent at a different database partition. See also request.

remote-resident resource
A printer resource that resides on a workstation for use by an attached printer. Remote-resident resources are identified by the APTRMARK utility of PSF/VSE.

remote resource
In CICS intercommunication, a resource that is owned by a remote system.

remote restart
The function that restarts a logical partition on a different physical server during a server outage.

remote scratchpad
An electronic clipboard where useful files and folders can be copied and pasted or dragged and dropped for later use.

remote service requester
In OSI, a service requester process on a remote node. See also local service requester.

remote shell (rsh)

  1. In the distributed shell (dsh) program, the shell in which the remote command will run.
  2. A variant of the remote login (rlogin) command that invokes a command interpreter on a remote UNIX machine and passes the command-line arguments to the command interpreter, omitting the login step completely.

remote site
In an RSR environment, the physically remote location of the tracking IMS and shadows databases. If a remote takeover occurs, it becomes the active site.

Remote Site Recovery (RSR)
A feature of IMS that minimizes the impact of active site failures by having a geographically remote IMS track active IMSs. Production work is taken over at the remote site in the event of a disaster or site-wide failure at the active site. See also tracking IMS.

Remote Spooling Communications Subsystem (RSCS)
An IBM licensed program that transfers spool files, commands, and messages between VM users, remote stations, and remote and local batch systems through HASP-compatible telecommunication facilities.

remote stand-alone secondary server (RS secondary server)
A remote standalone secondary server participating in a high-availability configuration. RS secondary servers can be geographically distant from the primary server, serving as remote back-up servers in disaster-recovery scenarios. Each RS secondary server maintains a complete copy of the database, with updates transmitted asynchronously from the primary server over secure network connections.

Remote Statistics Interface (RSi)
In Performance Toolbox, the Manager API which allows an application program to access statistics from remote nodes (or the local host) through a network interface.

remote store
In the externalized customization programming model, a store where the presentation layer is separated from the data assets.

remote subsystem
Any relational database management system (RDBMS), except the local subsystem, with which the user or application can communicate. The subsystem need not be remote in any physical sense and might even operate on the same processor under the same z/OS system.

Remote Supervisor Adapter (RSA)
An IBM service processor that is built into some System x servers and available as an optional adapter for use with others. When used as a gateway service processor, the RSA can communicate with all service processors on the Advanced System Management (ASM) interconnect.

Remote Switch
A feature that runs on the Fabric Operating System (OS) and enables two fabric switches to be connected over an asynchronous transfer mode (ATM) connection. Remote Switch requires a compatible Fibre Channel-to-ATM gateway. The distance between each switch and the respective ATM gateway can be up to 10 km (6.214 mi).

remote synchronization
A set of tools that can be used to quickly transfer resources from a local project to a remote system in a systematic, repeatable way.

remote syntax check
An action that uses Rational Developer for System z JCL procedure support to submit resources to a z/OS-based compiler for syntax checking.

remote system
Any other system in the network with which a system can communicate. See also local system.

Remote System Explorer (RSE)
The workbench perspective for accessing and editing files, and developing applications, on any supported remote server, such as an IBM i or Linux server. For example, IBM i users can create a connection to a remote host and navigate IBM i objects.

remote table
In a distributed query, a table in a database of a server that is not the local database server. See also coordinating server, subordinate server.

remote takeover
In an RSR environment, an action initiated by an IMS operator to transfer the active IMS workload from the active site to the remote site. See also planned remote takeover, unplanned remote takeover.

remote target
An additional storage system used for mirroring and data migration.

remote target connectivity
A definition of connectivity between a port set of a remote target and a module on the local storage system.

Remote Technical Assistance and Information Network (RETAIN)
Database used by IBM Support Centers to record all known problems with IBM licensed programs. See also catcher telephone number, heartbeat.

remote terminal

  1. A terminal attached to a system through a data link.
  2. A terminal that is not attached to the host system through an I/O channel.

remote terminal access method (RTAM)
A facility that controls operations between the job entry subsystem and remote terminals.

remote terminal processor (RTP)
A programmable remote workstation.

Remote To Local (R2L)
The external traffic from a remote network to a local network.

Remote To Remote (R2R)
The external traffic from a remote network to another remote network.

remote transaction
In a multisystem environment, a transaction whose total processing is shared between two or more systems. See also local transaction, local transaction.

remote unit of work (RUOW)

  1. A unit of work that allows for the remote preparation and execution of SQL statements.
  2. A unit of work that lets a user or an application program read or update data at one location per unit of work. RUOW supports access to one database within a unit of work. An application program can update several remote databases, but it can access only one database within a unit of work. See also unit of work.
  3. The form of SQL distributed processing in which the application is on a system different from the relational database, and a single application server services all remote unit-of-work requests within a single logical unit of work.

remote user
See local user.

remote workstation
A workstation that is connected to the system by data communications. See also local workstation.

remote writer
A system program that sends spooled files from an output queue to a remote system.

removable media
Volumes that can be removed from the hardware devices (such as tape cartridges and optical disks) where they are read and written.

removable media library
A mechanism for storing multiple units of removable media that can be individually selected and inserted into drives that are installed within the library for reading and writing.

Removable Media Management (RMM)

removable storage device
Any storage device defined during system configuration to be an optional part of the system DASD. A removable storage device can be removed from the system anytime during normal operation.

remove method
In enterprise beans, a method defined in the home interface and invoked by a client to destroy an enterprise bean.


  1. To take data that is not typically image-oriented and depict or display it as an image. In Content Manager, word-processing documents can be rendered as images for display purposes.
  2. To create an image on a visual display from data that describes the scene.


  1. In Ada language, the interaction that occurs between two parallel tasks when one task has called an entry of the other task, and a corresponding accept statement is being executed by the other task on behalf of the calling task.
  2. Former name for IBM's Enhanced Audio Conferencing service.

rendezvous processing
The sequence of TCP connection management flows that are required to establish SMC communications between two peers.

renewable ticket
A ticket that contains two expiration times: one that applies to the current instance of the ticket, and one that applies to the latest permissible expiration of the ticket. Renewable tickets are valid for an extended period of time while lessening the changes for theft.

renewal price
The calculated price of a line (product) as quoted in a renewal quote contract.

renewal quote contract
A quote contract that uses one or more lines from one or several contracts about to expire and then derives a renewal price for each line.

renewal term
The renewal details of a line that specify the renewal quantity, renewal price, and the active term.

The process of reconsidering, at run time, the access path of an SQL statement that has already been optimized. During reoptimization, the actual values of host variables, parameter markers, and special registers might be considered in choosing the access path.

reordered row format
A row format that facilitates improved performance in retrieval of rows that have varying-length columns. DB2 rearranges the column order, as defined in the CREATE TABLE statement, so that the fixed-length columns are stored at the beginning of the row and the varying-length columns are stored at the end of the row. See also basic row format.

reorder point (ROP)
The point at which an inventory item should be reordered so that its in-stock balance does not fall below the level designated as safety stock during the lead time for the order.

REORG pending (REORP)
A condition that restricts SQL access and most utility access to an object that must be reorganized.

REORG-recommended operation
An operation that changes the format of the data that is written to permanent storage for a table and restricts the operations that are allowed on the table until the data in the table is reorganized.

See REORG pending.

repage fault
A page fault on a virtual-memory page that is known to have been read from disk "recently."

repair order
A record that tracks the repair of a piece of equipment.

A type of read integrity in which a program is permitted to issue multiple read-only requests, with repeatable read integrity, and be assured that none of the records passed can subsequently be changed until the end of the sequence of repeatable read requests. The sequence of repeatable read requests ends either when the transaction terminates, or when it takes a syncpoint, whichever is the earlier. See also consistent, read integrity.

repeatable read (RR)
An isolation level under which a query that is issued more than once in a transaction reads the same rows again for each subsequent execution, except for rows that might have been changed earlier in the same transaction. Additional (phantom) rows are not read. A query in a transaction using RR is prevented from reading any rows changed by statements in other transactions until the changes have been committed. Also, until the transaction using RR has been committed, any rows that a query in that transaction reads cannot be changed by statements in other transactions. See also cursor stability, isolation level, read stability, uncommitted read.

repeatable sequence
A field or a group of fields that is contained more than once in a message. For example, if the SWIFT fields 20, 32, and 72 form a sequence, and if this sequence can be repeated in a message, each sequence of the fields 20, 32, and 72 would be an occurrence of the repeatable sequence. An occurrence can be referred to by a number. A repeatable sequence may contain another repeatable sequence.


  1. In Cognos Analytics - Reporting, a cell container that repeats values within itself with no predefined internal structure.
  2. A device that regenerates signals in order to extend the range of transmission between data stations or to interconnect two branches.

repeater range
The Tivoli clients that receive data from a repeater site.

repeater site
In a TME 10 Management Region (TMR), a managed node that is configured with the MDist feature. A repeater site receives a single copy of data and distributes it to the next tier of clients.

repeater table
In Cognos Analytics - Reporting, a table-like container that repeats cells across and down the page or row in the associated query.

repeat factor
In GL, the magnification with which the linestyle pattern is used.

repeating group
An entity that includes multiple attributes that are inherently the same. The presence of a repeating group violates the requirement of first normal form. In an entity that satisfies the requirement of first normal form, each attribute is independent and unique in its meaning and its name. See also normalization.

repeat key
A key on a keyboard that repeats its function when pressed and held down.

repeat sale
The subsequent sale of a product after the initial purchase. The level of repeat sales for a product is often used as a measure of customer satisfaction--the higher the level of repeat sales, the more satisfied customers are.

repeat string
In architecture, a method used to repeat the character content of text data until a given number of characters has been processed. Any control sequences in the text data are ignored.

repeat to address (RA)
An order to position data in the buffer of a 3270 terminal, thereby controlling the position of the data on the screen. An RA order is followed by a 2-byte buffer address, and a one-byte character to be repeated. The order copies the one-byte character repeatedly into the buffer until the 2-byte address is reached.

Configuration information that contains the details necessary for building a Secure Sockets Layer (SSL) connection.

repetitive DO loop
In REXX, any instruction that has either a repetitor phrase or a conditional phrase (or both). The instruction list within the instruction is run zero or more times, controlled by any repetitor phrase that is optionally changed by a conditional phrase.

replaced by term
A term in a business glossary that supersedes another term. Typically, deprecated terms specify replacement terms to identify which term replaces the deprecated term. See also deprecated term.

replacement code point
In alerts, a 2-byte code point in which the first byte indexes text providing a high-level description of a condition, and the second byte indexes text providing a more specific description. The second byte is nonzero.

replacement key
An encrypted character string lock that specifies some of the terms and conditions for acquiring software products described in an upgraded custom configuration. See also initial key.

replan current period
In Tivoli Workload Scheduler for z/OS, a function that recalculates planned start times for all occurrences to reflect the actual situation.


  1. The redisplay of a visitor's session on a website, as it was originally experienced by the visitor. After a visitor's hits have been collected and sequenced into a session, that session can be replayed in the manner that the visitor experienced it, with the visitor's selections and entries highlighted for the Tealeaf user to see.
  2. To apply the contents of a database log to a standby database, such as during a recovery operation.
  3. A function that triggers a message exchange flow to reprocess a transaction in its entirety.

replay detection mechanism
A method that allows a principal to detect whether a request is a valid request from a source that can be trusted or whether an untrustworthy entity has captured information from a previous exchange and is replaying the information exchange to gain access to the principal.

replay protection
A security service that ensures that an attacker cannot intercept message packets and retransmit them.

replay server template
An HTML file that is packaged and installed with IBM Tealeaf CX and is used to render and replay mobile session data.

The process of refilling an active pick location based on deliberate, controlled calculation and task assignment.

replenishment frequency
The number of times that store or distribution centre inventory is replaced in a given time period.


  1. A server that contains a copy of the directory or directories of another server. Replicas back up servers in order to enhance performance or response times and to ensure data integrity.
  2. A special copy of a Notes database that, because it shares a replica ID with the original database, can exchange information with it through replication.
  3. In the Lightweight Directory Access Protocol (LDAP), a read-only server that contains the same data as another server. Replicas are used to back up LDAP servers and to provide faster searches by splitting requests among the main server and replica servers.
  4. An instance of a versioned object base (VOB) located at a particular site.

replica ID
A unique number that is generated when a Notes database is first created. The replica ID is stored in the database header and never changes. When you make a replica of the database, the replica inherits the replica ID. For two databases to replicate, they must share the same replica ID.

replica set
A set of collective controllers where each collective controller can replicate its data to the other collective controllers in the set.

replica table
In SQL replication, specifically in update-anywhere replication, a type of target table that can be updated locally and also receives updates from the master table through a subscription-set definition. If replication conflict detection is enabled, changes made to the replica table are rejected, whereas changes made to the master table are retained. See also conflict detection, master table, update-anywhere replication.


  1. In a remote journal network, to make a duplicate copy of a journal entry from a source journal to a target journal.
  2. In Enterprise Replication, pertains to participants and various attributes of how to replicate the data, such as frequency and how to handle any conflicts during replication. See also master replicate, shadow replicate.

replicated application program
In VTAM, an application program that is built from a model application program definition.

replicated resource
A volume group resource that is mirrored to another disk subsystem in real time. Any resource is contained in a replicated resource group.

replicated resource group
A resource group that is configured to have both primary and secondary instances distributed on nodes located at two different sites. See also primary instance, primary site, secondary instance, secondary site.

replicated server
An OS deployment server which shares data with one or several other OS deployment servers. The servers are hierarchically structured with a parent and child servers. A child server can act as parent to replicated servers further down in the hierarchy.

replicated subtree
A portion of the directory information tree that is replicated from one server to another. Under this design, a given subtree can be replicated to some servers and not to others. Subtrees can be writable on a given server, or read-only.

replicate node
A complete copy of a cluster resource that is kept up to date through replication. A node that is designated a replicate node cannot become a backup node or a primary node.


  1. The process of maintaining a defined set of data in more than one location. Replication involves copying designated changes for one location (a source) to another (a target) and synchronizing the data in both locations.
  2. The process of exchanging modifications between replicas. Through replication, Notes makes all of the replicas essentially identical over time.
  3. The process of copying objects from one node in a cluster to one or more other nodes in the cluster, which makes the objects on all the systems identical.

replication administrator
In SQL replication and in Q replication, the user who is responsible for registering replication sources and creating subscription sets. This user can also run the Capture program and the Apply program.

replication agreement
Information contained in the directory that defines the connection or replication path between two servers. One server is called the supplier (the one that sends the changes) and the other is the consumer (the one that receives the changes). The agreement contains all the information needed for making a connection from the supplier to the consumer and scheduling replication

Replication Alert Monitor
A program that checks the operation of the Capture, Apply, Q Capture, and Q Apply programs and sends alerts to one or more users when it detects the specified alert conditions.

Replication Analyzer
A program that can analyze a replication environment for setup problems, configuration errors, and performance issues.

Replication Center
A graphical interface that can be used to define, operate, maintain, and monitor the replication environment.

replication conflict
A condition that occurs when two or more users edit the same document in different replicas of a Notes database between replications.

replication control table
A table in which replication definitions or control information is stored.

replication domain
A collection of application server components that share data. These components might include HTTP sessions, dynamic cache, stateful session beans, or the session initiation protocol (SIP) component.

replication entry
A runtime component that handles the transfer of internal data.

replication latency
The amount of time that it takes for a transaction against a source table to be applied to a shadow table. See also latency-based routing, shadow table.

replication logging
A logging facility that is used to replicate VSAM and RLS files from one location to another.

replication monitor
A document created in the Statistics and Events database that causes the Event task on a server to monitor a specific database to make sure that it is replicating.

replication queue map
In Q replication, an object that links a send queue and a receive queue. The replication queue map includes settings for how a Q Capture program processes all transactions that use the send queue and how a Q Apply program processes all transactions that use the receive queue. See also publishing queue map, queue map.

replication server
An Informix database server that participates in Enterprise Replication.

replication source

  1. In Q replication, a table that is a source for replication. Changes made to this type of table are captured and copied to a target table that is defined in a Q subscription or a publication. See also publication, Q subscription.
  2. In SQL replication, a table, view, or nickname that is registered as a source for replication. Changes that are made to this table, view, or nickname are captured and copied to a target table that is defined in a subscription-set member. See also subscription set, subscription-set member.

replication subscription
See subscription set.

replication target
In Q replication and in SQL replication, a table or procedure that is a destination for changes that were replicated from a source. The Q Apply program applies these changes. See also target table.

The part of the workspace where Notes displays all replica databases and lets users manage the replication process.


  1. In SNA, a request unit sent only in reaction to a received request unit. For example, Quiesce Complete is the reply sent after receipt of Quiesce At End of Chain.
  2. See response.
  3. In Enhanced X-Windows, the way information requested by a client program is sent back to the client. Both events and replies are multiplexed on the same connection. Most requests do not generate replies; some generate multiple replies.

reply message
A type of message used for replies to request messages. See also report message, request message.

reply-to address

  1. A unique address that identifies both a person who replied to a notification and the event or item that triggered the notification.
  2. A string of data that represents the address to be replied to. The contents and format of the string are not defined by the mail server framework. The address type associated with the reply-to address is assumed to define the contents of the reply-to address field.

reply-to queue
The name of a queue to which the program that issued an MQPUT call wants a reply message or report message sent.

See repository.

See reported value.


  1. A set of data deliberately laid out to communicate business information. See also report specification.
  2. Data that has been selected and extracted according to the reporting tool, the type of report desired. and formatting criteria.
  3. A document, or set of documents, that have been loaded into the OnDemand system and are defined by a named query, SQL statement, or supplied load parameters.
  4. In query management, the formatted data that results from running a query and applying a form to it.
  5. A formatted presentation of information. Reports can be viewed online, printed, or exported to various file formats.

reportable shape
A user-defined set of conditions that defines which attributes and link types are available for use by external reporting tools.

report book
A set of reports which can be generated together, instead of individually.

report break
In Query, a blank line or new page that appears in a report when the contents of a specified field in the report change. A report break can contain column summaries.

report container
A group of settings that define the overall presentation of a report, including page dimensions and orientation, margin sizes, and options for displaying title, author, and summary information.

report context
The basis for a displayed report. The context changes depending on which function you are using in the WebSphere Commerce Accelerator. Available report contexts include campaigns, initiatives, and a combined context.

report designer (RD)
A module that designs and defines reports. The RD module's front-end component provides a modeler capable of outlining every type of report. Using this modeler, the administrator can visually represent the report creation process.

reported value (REPO)
A value created by data entry or import, without any manual corrections. The abbreviation for reported value is REPO.

report group

  1. A group that lists software items based on license compliance ownership. Typically, a report group contains software items that belong to a single customer for whom an audit report is generated.
  2. A container for a dimension. A report group can contain up to four dimensions.

reporting attribute
A code that specifies how a workstation will report events to Tivoli Workload Scheduler for z/OS. See also nonreporting attribute.

reporting group
A group of customers or counterparties that are summarized to a reporting point because they have the same attributes or characteristics. The attributes used for grouping can vary for each reporting group defined.

reporting node
In OSI, a node that reports a message to a manager node.

reporting period
In Passport Advantage, the period that begins on the first day of the first month in a calendar quarter and ends on the last day of the last month in the calendar quarter.

reporting rule
A rule that the software uses for naming the collected data that is displayed in the workspaces.

reporting schema
A database schema that is required for the reporting server.

reporting server
A software program or computer that provides reporting services to other software programs and computers.

reporting tool
A program that selects and extracts data according to a specified report type and formatting criteria.

reporting user
The user who submits a service request or work order or reports an incident or problem.

reporting view
An API object that fetches information from the database. Developers use these views primarily to create reports, but they can also be used to create a web services application or policy syndication connector, or any other programming purpose. The data that these views provide is fetched in real time from the database.

reporting warehouse
A data warehouse (database) that is used to store historical information about registered WiFi-enabled devices, unregistered WiFi-enabled devices, or both in the sites where Presence Zones is installed. This data is used by the reporting server, which leverages IBM Congos Business Intelligence technology to create reports.

report interface (RPI)
In Tivoli Enterprise Data Warehouse Version 1.1, the component that provides historical reporting capabilities. Using the report interface, users can create and run reports; create and manage data marts that have the format required by the Tivoli Enterprise Data Warehouse report-generating tools; and create and manage the groups that control access to those data marts. See also report server.

report interval
A configurable time interval at the end of which the event processor must send all captured event and flow data to the console.

report layout utility (RLU)
A function of the Application Development ToolSet feature that is used to create, change, and save report prototypes.

report line
In RLU, a record that is part of a report prototype for which the user creates data description specifications (DDS).

report mailslot
A division of the mainframe mailbox on Sterling B2B Collaboration Network that receives reports that are generated within the network.

report message
A type of message that gives information about another message. A report message can indicate that a message has been delivered, has arrived at its destination, has expired, or could not be processed for some reason. See also reply message, request message.

report object query variable
A variable that is used to filter data source queries for a particular report object. After the value of the variable has been overridden at the report level, it can be further overridden to filter the result set for the report object.

report output
The output produced as a result of executing a report specification against a data set.

Report Program Generator (RPG)
A programming language designed for writing application programs for business data processing requirements. The application programs range from report writing and inquiry programs to applications such as payroll, order entry, and production planning.

report prototype
In RLU, a representation of the image of a report that a user builds on a display and the printed report image, both of which look like the actual listing created by an application program. The report prototype, when saved as a DDS source member, can be used to create a printer file, which, in turn, can be used by an application program to create a report.

report query variable
A variable that is used to filter data source queries at the report level. The value of the variable can be overridden to filter the result set for all report objects referencing that query.

report segment
A set of criteria that limits report results to a subset of visitor sessions. See “profile segment”.

report server

  1. An application server that hosts reports and report editors.
  2. In Tivoli Enterprise Data Warehouse, Version 1.1, the system where the report interface component is installed. more data sources and one or more target warehouses. Warehouse agents use Open Database Connectivity See also report interface.

report specification
An executable definition of a report, including query and layout rules, which can be combined with data to produce a report output. See also report.

report template
A template that is used to create reports. Parameters in the report template are specified when the report is created or run.

report type
A data source and how it is mapped.

report view
A reference to another report that has its own properties, such as prompt values, schedules, and results. Report views can be used to share a report specification instead of making copies of it.

A process in which PSF, following an indication from the printer of a potentially recoverable error, locates the proper spool record for recomposing one or more pages for printing.

repositioning leg
A dedicated fleet route that is used to move a truck from the destination of one leg to another location. For example, the carrier might use a repositioning leg to move the truck from a shipment destination to a maintenance depot or the domicile of the driver. See also deadhead leg.


  1. A persistent storage area where packages are available for download.
  2. A VSAM data set on which the states of BTS processes are stored. When a process is not executing under the control of BTS, its state (and the states of its constituent activities) are preserved by being written to a repository data set. The states of all processes of a particular process-type (and of their activity instances) are stored on the same repository data set. Records for multiple process-types can be written to the same repository.
  3. A persistent storage area for data and other application resources.
  4. A collection of information about the queue managers that are members of a cluster. This information includes queue manager names, their locations, their channels, and what queues they host.

repository access manager (RAM)
A piece of software that provides connections to a specific type of software change manager (SCM), such as Software Configuration Library Manager (SCLM), a component of the Interactive System Productivity Facility (ISPF) product.

repository administrator
A person who configures and tests repository functions such as database connections, email subscriptions, index timers, and custom user information. The repository administrator is responsible for configuring the Service Oriented Architecture (SOA) product integrations; and creating team spaces, asset types, category schemas, and asset relationships.

repository checkpoint
A function that backs up copies of files from the master configuration repository. The backup files can be used to restore the configuration to a previous state if future configuration changes cause operational problems.

repository content adapter
An optional software package that enables storing and processing content from other IBM SPSS applications, such as Statistics, Modeler, and Data Collection, as well as third parties.

repository database
A relational database that is used for storing content repository objects and metadata.

repository index data set (RID)
A VSAM key-sequenced data set (KSDS) that contains the names and keys of all members in an IMS repository. A repository index data set is used by the Repository Server (RS) or a user-defined IMS repository. See also IMS repository function, repository member data set.

repository instance
A project or component that exists in a software change manager (SCM).

repository library
A collection of assets and asset metadata in which users can manage assets and control their availability.

repository member data set (RMD)
A VSAM key-sequenced data set (KSDS) that contains the member data that is indexed by the repository index data set (RID). A repository member data set is used by the Repository Server (RS) or a user-defined IMS repository. See also IMS repository function, repository index data set.

repository pool
A division of a persistent storage area for data and other application resources.

repository queue manager
A queue manager that hosts the full repository of information about a cluster.

repository server
A BPE-based address space for managing the repositories of the IMS repository function, such as the IMSRSC repository. The RS is managed by the Common Service Layer (CSL) Resource Manager (RM), which interacts with the RS to read, write, and delete stored resources, such as resource and descriptor definitions, from an IMS repository.

repository statistics
Data that can be used to generate audit reports about repository contents, asset activities, and search history.

repository tier
The metadata repository and, if installed, the InfoSphere Information Analyzer database (analysis database) and the computer or computers where these components are installed.

repository utility
A CICS utility program, DFHBARUP, that enables you to print selected records from a specified BTS repository data set.

repository workspace
A repository object that includes one or more components. Repository workspaces are typically used by individual team members to contain their changes in progress. Team members deliver their changes from their repository workspace to the stream and accept changes from other team members into their repository workspace from the stream. Every repository workspace has an owner, and only the owner can make changes in the workspace. See also workspace.


  1. The form in which an entity is represented on a chart. See also box, circle, event frame, icon, theme line.
  2. An HTTP payload entity that is included in an HTTP response and is subject to content negotiation.

Representational State Transfer (REST)
A software architectural style for distributed hypermedia systems like the World Wide Web. The term is also often used to describe any simple interface that uses XML (or YAML, JSON, plain text) over HTTP without an additional messaging layer such as SOAP. See also RESTful, web-oriented architecture.

representative record
The record that is created during survivorship and populated with the best available data from a group of records. See also survivorship.

See request for acknowledgment and acknowledgment.

req auto email
See requisition automatic email.

req code
See requisition code.

req field association
See requisition field association.

req form
See requisition form.

req ID
See requisition ID.

See request for maintenance statistics.


  1. A set of holds, collections, and interviews that are needed to fulfill a requirement to gather information about a matter. Each request is created in the context of a matter and defines the lists of custodians and data sources. A single matter typically has more than one request. For example, a new request is created when opposing council issues a request for the discovery of additional material.
  2. A directive to perform a discrete action within a database system. A request is acted upon by a database agent. See also application request, remote request, subagent request.
  3. In Enhanced X-Windows, a command to the server to send a single block of data over a connection.
  4. In OSI, a service primitive issued by a service user to call a function supported by the service provider.
  5. An item that initiates a workflow and the various activities of a workflow. See also workflow.
  6. In a request/response interaction, the role performed by a business object that instructs a connector to interact with an application or other programmatic entity.
  7. See transaction.
  8. The part of a web address that follows the protocol and server host name. For example, in the address http://www.server.com/rfoul/sched.htm, the request is /rfoul/sched.html.
  9. A solicitation for items such as office stationery, cleaning equipment, and material or calibration devices and services such as facilities management, documentation, and translation services that are initiated by a buyer.
  10. A message from one computer to another asking for a resource.
  11. A directive, by means of a basic transmission unit, from an access method that causes the network control program to perform a data-transfer operation or auxiliary operation.
  12. In SNA, a message unit that signals the initiation of an action or protocol.

request approval workflow
A workflow that defines the business logic. Typically it contains a series of activities and participants. The workflow is used to approve requests, such as account requests and access requests. See also workflow.

request class
A classification record that determines many of the business rules that are to be applied by the service management process. See also service management process.

request commit
The vote that is submitted to the prepare phase if the participant has modified data and is prepared to commit or roll back.

request consumer binding
A definition of the security requests for the request message that is received by a web service.

requested commitment date
The deadline by which suppliers send purchase order (PO) commitments, and are expected to commit the quantity within the requested date range.

requested delivery date
The date on which the products in the quote have been requested for delivery.

requested reset statistics
CICS statistics that the user has asked for by using the appropriate command or transaction, and specifying the RESETNOW option. The statistics are written to the SMF data set immediately, and the statistics counters are reset to zero. See also interval statistics, requested statistics, unsolicited statistics.

requested statistics
CICS statistics that the user has asked for by using the appropriate command or transaction, which causes statistics to be written immediately, instead of waiting for the current interval to expire. The request does not reset the statistics. See also interval statistics, requested reset statistics, unsolicited statistics.

requested time
The date, that is specified by the buyer, by which the supplier must ship or deliver the order.


  1. The source of a request to access data at a remote server.
  2. In System i Access, a program that requests services from another program (a server). Each System i Access function has a server and a requester.
  3. See client.
  4. A display station or interactive communications session that requests a program to be run.
  5. A workstation from which a user can log on to a domain and use network resources.

requester channel
In message queuing, a channel that can be started locally to initiate operation of a server channel. See also server channel.

request flow
The flow of the message from the service requester.

request for acknowledgment and acknowledgment (REQ/ACK)
A cycle of communication between two data-transport devices for the purpose of verifying the connection, which starts with a request for acknowledgment from one of the devices and ends with an acknowledgment from the second device. The REQ and ACK signals help to provide uniform timing to support synchronous data transfer between an initiator and a target. The objective of a synchronous data-transfer method is to minimize the effect of device and cable delays.

request for bid (RFB)
A request made by a seller to potential customers for a bid price for a product or service.

request for change (RFC)
A formal proposal for a change to any component of the information technology infrastructure or any aspect of an information technology service.

Request for Comments (RFC)
In Internet communication, one of a series of numbered documents that describe Internet communication protocols.

request for enhancement (RFE)
A request made by a systems integrator to IBM to open an API end point for the purpose of customization.

request for information (RFI)

  1. A workflow activity that requests additional information from the specified participant.
  2. An RFx that buyers use to obtain detailed information from a supplier.

request for maintenance statistics (REQMS)
A host solicitation to an SNA controller for a statistical data record.

request for price quotation (RPQ)
A customer request for a price quotation on alterations or additions to the functional capabilities of a hardware product for a computing system or a device. See also programming request for price quotation.

request for proposal (RFP)

  1. A formal invitation containing a scope of work which seeks a formal response (proposal) describing both methodology and compensation to form the basis of a contract.
  2. An RFx in which buyer users can create questionnaires to obtain information from suppliers as well as define items for bidding.

request for quote (RFQ)

  1. The trading mechanism used when a buyer solicits quotes for a specific set of goods or services. It can be used if a buyer does not find a particular item in the catalog, finds an item without a price, or wants to establish a long-term supply arrangement for a fixed-price item.
  2. A formal invitation to submit a price for goods and/or services as specified.

request for service (RFS)
An administrative business process where requests for funds and time are seeking management approval on a new project.

request for solution (RFS)
A document that is used to solicit information from suppliers to bid on a desired solution, but it is not as prescriptive as either an RFP or RFQ. The RFS generally allows the bidders more flexibility in the requirements of a solution as long as it meets the client’s needs.

request forwarding
The process of enabling data requests to be serviced by a site that is geographically closest to the object store database.

request for X (RF(x))
‌In sourcing and procurement, a general reference to request for proposal (RFP), request for information (RFI), or request for quote (RFQ).

request functional transmission
In multileaving telecommunications access method (MTAM), a control character indicating a request for permission to send data. See also grant functional transmission.

request generator binding
A definition of the security requests for the request message that is sent to a web service.

request header (RH)

  1. In SNA, a 3-byte header that precedes a request unit. The request header specifies the type of request unit and contains control information associated with that request unit. See also response header.
  2. In SNA, the control information that precedes a request unit. See also request/response header.

requesting region
The region in which a dynamic routing request originates. For dynamic transaction routing and inbound client dynamic program link requests, this is typically a TOR; for dynamic START requests and peer-to-peer dynamic program link requests, this is typically an AOR. To be eligible for dynamic routing, the process or activity must be started by an EXEC CICS RUN ASYNCHRONOUS command. See also routing region, target region.

request-level RAS granularity
The level of RAS granularity at which RAS attributes are assigned on a request-by-request basis to all requests for a particular request classification, such as HTTP requests that end in .jpg, a specific HTTP request for a URI such as /PlantsByWebSphere/index.html, or all IIOP requests for a particular EJB. See also RAS granularity.

request message
A type of message used to request a reply from another program. See also reply message, report message.

request metrics
A mechanism to monitor and troubleshoot performance bottlenecks in the system at an individual request level.

request parameter list (RPL)
In VTAM, a control block that contains the parameters necessary for processing a request for data transfer, for establishing or terminating a session, or for some other operation.

request queue
The queue in which a service request is stored. It resides in main storage and consists of a set of request queue elements that are chained in the following different queues: requests waiting to be processed, requests currently being processed, and requests for which processing has finished.

request queue handler (RQH)
A MERVA ESA component that handles the queueing and scheduling of service requests. It controls the request processing of a nucleus server according to rules defined in the finite state machine.

request rate
The rate at which requests arrive at a servicing entity. See also service rate.

request receiver binding
A definition of the security requirements for the request message that is received from a request to a web service.

A type of messaging application in which a request message is used to request a reply from another application. See also datagram.

request/response header (RH)
In SNA networking, control information preceding a request/response unit (RU), specifying the type of RU (request unit or response unit) and containing control information associated with that RU. See also request header, request/response unit.

request/response unit (RU)
A generic term for a request unit or a response unit. See also request/response header.

request sender binding
A definition of the security requirements for the request message that is sent to a web service.

request token
A value that is used by the consumer to obtain authorization from the user and that is exchanged for an access token.

request to send (RTS)
In data communication, a signal raised by data terminal equipment (DTE), while the data terminal is ready, to request facilities from data circuit-terminating equipment (DCE) so that data can be sent. See also clear to send.

request unit (RU)
In SNA, a message unit that contains data, control information, or both (for example, data and indicators).

required blank
In DCF, a character that prints as a blank, but does not act as a word separator. See also null character.

required component
A component that can be defined within a group type to represent a data object that must be present in the data. The component range minimum specifies how many occurrences of the data object are required.

required cryptographic session
A cryptographic session in which all outbound data is enciphered and all inbound data is deciphered. See also cryptographic session, selective cryptographic session.

required hyphen
A hyphen that is not removed when the program adjusts lines. See also syllable hyphen.

required parameter
A parameter having no automatically supplied value; the user must provide a value.

required space

  1. A space or blank that must not be removed when adjusting a line or paragraph of text, such as the space in 10 000. Required space has an IBM GCGID of SP30. See also numeric space, space.
  2. See required blank.

required value
See required parameter.


  1. A post-solution representation of a rule. A requirement may be relaxed if it is in conflict with other requirements. Priorities can be assigned to requirements to control which ones are relaxed. See also constraint, rule.
  2. In testing, a recorded event that is saved as an action to be tested.
  3. A condition or capability that a system must provide. This condition is either derived from user needs or stated in a contract, standard, specification, or other document.
  4. A condition or capability needed by a user to solve a problem or achieve an objective that must be met or possessed by a system or system component to satisfy a contract, standard, specification, or other formally imposed document. (ISTQB)

requirement attribute
Information associated with a requirement providing a link between the requirement and other project elements for example, priorities, schedules, status, design elements, resources, costs, hazards.

requirement attribute label
See attribute label.

requirement attribute matrix
See Attribute Matrix.

requirement attribute type
See attribute type.

requirement attribute value
See attribute value.

requirement location
The location where a requirement was created or the location to which it was last moved. The location can be either a specific requirements document or the project database.

Requirement Metrics
A Rational RequisitePro feature that compiles statistics on requirement name, text, attributes, relationships, and revisions.

requirements document
A document that captures requirements and is used to communicate product development efforts. Each requirements document addresses a particular requirement type, such as product features, use cases, and supplementary specifications.

requirements management (RM)
A systematic approach to eliciting, organizing and documenting the requirements of a system, and establishing and maintaining agreement between the customer and the project team on changes to those requirements.

Requirements Management Rich Text Format (RM-RTF)
The native format of textual requirements in the RM system.

requirements plan
A plan that defines the approved requirements that a project must satisfy.

requirements text
The full textual content of a requirement. In a document, it may include embedded and linked objects, such as graphics, tables, and Microsoft Word files.

requirement tag
The unique identifier of each requirement in a project. A requirement tag is composed of a tag prefix and a unique numerical value, such as "PR100.1.2." The tag prefix is always the requirement type, as defined in the Project Properties dialog box. The numerical value is generated by RequisitePro. See also pending tag number.

requirement tag prefix
The part of a requirement tag that identifies the requirement type.

requirement text
The full textual content of a requirement. In a document, it may include embedded and linked objects, such as graphics, tables, and Microsoft Word files.

requirement type
A set of descriptive and operational information associated with a requirement when the requirement is created. A requirement type serves as an outline for all requirements of the same type and is useful for classifying and grouping similar requirements in a project. Each requirement type has its own set of user-defined attributes.

A software product or a service update that must be installed with another software product or service update. If you attempt to install software products or service updates without the required requisite software, a system message displays the names of required requisite software. See also corequisite.

Rational's web interface that allows clients to access RequisitePro requirements information across an intranet. RequisiteWeb provides a thin client solution to access project documents and data in a web browser. No Requisite application-specific files need to be installed on individual machines.

A request for an asset, item, tool, or service. The requested entity can be procured from a vendor, or it can be acquired by an inter-departmental transfer.

requisition approval
See approval routing.

requisition automatic email (req auto email)
A configurable email that is automatically sent to candidates who apply to a specific requisition.

requisition code (req code)
The automatically generated unique identifier assigned to an individual job req when it is created. This code identifies the specific job opening at that point in time.

requisition field association (req field association)
A field binding that can be used to designate which field values drive (pre-populate) other field values.

requisition form (req form)
An electronic form comprised of standard and custom fields used for tracking and approving job openings.

requisition ID (req ID)
See requisition code.

requisition subsidiary form
A form that is available as a attachment to a requisition in order to record data.

To calculate updated shipment charges.

To re-evaluate entities against existing entities, relationships, or resolutions, and then resolve those entities appropriately.

Pertaining to a system that can reroute operations if the workstation on which they are scheduled to run is inactive, for example, if communication links to the system where the workstation is located fail. This option applies to operations only when they have status R (ready) or W (waiting).

In Tivoli Workload Scheduler for z/OS, a function that lets an application or part of an application that ended in error be run again.


  1. To change the pel density of a print object to a different pel density; for example, changing the resolution of an image object from 240 dpi to 300 dpi.
  2. To change graph dimensions to better fit the data points and values in a graphical interface.

reservable license
A network license that the administrator can reserve for the exclusive use of a user, a group, and a node. The reservation is for a specified time period.


  1. A concurrent-offline license that is reserved for a defined offline period and for use as an offline-nodelocked license.
  2. The preallocation of configuration items for future deployments.
  3. In QoS, part of a resource that has been dedicated for the use of a particular traffic type for a period of time through the application of policies.
  4. The act of reserving inventory items for a specific order.

ReSerVation Protocol (RSVP)
A resource reservation setup protocol designed for an integrated services Internet. The protocol provides receiver-initiated setup of resource reservations for multicast and unicast data flows.

reservation version status
The status that indicates a checked out, but not yet checked in, version of a document. See also check out.

In architecture, having no assigned meaning and put aside for future use. The content of reserved fields is not used by receivers, and should be set by generators to a specified value, if given, or to binary zeros. A reserved field or value can be assigned a meaning by an architecture at any time.

reserved allegiance
In mainframe computing, a relationship that is created in a control unit between a device and a channel path when the device completes a Sense Reserve command. Reserved allegiance causes the control unit to guarantee access (a busy status is not presented) to the device. The device is accessed over the set of channel paths that are associated with the reserved allegiance. Access is for one or more channel programs until the reserved allegiance ends. See also contingent allegiance, implicit allegiance.

reserved character
A character or symbol that has a special (non-literal) meaning unless quoted.

reserved inventory
Inventory that has been designated for a particular purpose, and is not available to allocate to orders.

reserved item
An item is placed on hold in a storeroom for a given work order, GL account, asset, or location.

reserved license
A license that the administrator has reserved for the exclusive use of a user, a group, and a node.

reserved memory
The area of main storage between 640 KB and 1 MB on a personal computer. Reserved memory cannot be used by adapters and special programs, such as expanded memory support.

reserved pages
The first 12 pages of the initial chunk of the root dbspace. Each reserved page stores specific control and tracking information that the database server uses.

reserved price
The maximum price per unit that a buyer is willing to pay for an item.

reserved word

  1. A word that has been set aside for special use in the SQL standard.
  2. A word that is defined by a programming language and that cannot be used as an identifier or changed by the user.

reserve location
A storage location for material used to replenish picking locations. The material stored in these locations is not intended for picking, but as reserve stock.

reserve stock
Materials stored in the reserve area generally intended for replenishment of the active area.


  1. To return a document to its original lifecycle state. See also exception state, lifecycle policy.
  2. On a virtual circuit, the reinitialization of data flow control. At reset, all data in transit are eliminated.
  3. In X.25 communications, to reinitialize the flow of control on a virtual circuit, which eliminates all data that may be in transit for the virtual circuit at the time of resetting.
  4. To cause a counter to take the state corresponding to a specified initial number.
  5. To put all or part of a data processing device back into a prescribed state.
  6. A state that indicates that the current logical unit of work (LUW) has not yet begun to prepare to commit. A failure during RST state results in a rollback of any pending changes.

reset cause
See cause code.

reset color
In architecture, the color of a presentation space before any data is added to it.

reset confirmation packet
In X.25 communications, a packet transmitted by the data terminal equipment (DTE) to inform the data circuit-terminating equipment (DCE) that a reset operation has been processed.

reset indication packet
In X.25 communications, a packet transmitted by the data circuit-terminating equipment (DCE) to inform the data terminal equipment (DTE) that a virtual call or a permanent virtual circuit is being reset and the reason for the resetting.

reset packet
A packet used to reset a virtual circuit at the interface between the data terminal equipment (DTE) and the data circuit-terminating equipment.

reset request packet
In X.25 communications, a packet used for the resetting of a virtual circuit at the DTE/DCE interface.

To send an item again to a customer who reported that an ordered item was not received.

residence mode
The attribute of a load module or program object that identifies where in virtual storage the program will reside.

residency mode (RMODE)
In z/OS, a program attribute that refers to where a module is prepared to run. RMODE can be 24 or ANY. ANY refers to the fact that the module can be loaded either above or below the 16M line. RMODE 24 means the module expects to be loaded below the 16M line.

Pertaining to a computer program or data that stays in the memory of the computer while other programs are running.

resident file
On a Windows system, a complete file on a local file system that might also be a migrated file because a migrated copy can exist in server storage. On a UNIX or Linux system, a complete file on a local file system that has not been migrated or premigrated, or that has been recalled from server storage and modified.

resident font
In printers, those font data sets that are resident in the printer. They usually reside on the printer diskette media (floppy or hard disk). These font data sets are usually commonly used fonts, and having them resident reduces font loading time. These fonts can also be used during offline testing of the printer.

resident fully described font
A font stored in a printer that has most of the attributes that can be specified for a host font.

residential address
Any home, apartment, or other dwelling where people reside. A business can also be operated from a residence. In most cases, the freight carrier contacts the customer to make an appointment before delivery is attempted to a residential address.

resident member
A fully functional member that runs on its home host and that can accept a database connection from an external application. See also guest member, member.

resident module
A module that remains in a particular area of storage.

resident queue (RESQUEUE)
A control block built in storage by the job segment scheduler (JSS) to represent a scheduler element during the life of the scheduler element.

resident resource
A resource, such as a font, symbol set, page segment, or overlay, that resides in a printer or an intermediary device, such as a personal computer.

resident routine
A library routine that is linked with an application. Resident routines include initialization routines and callable service stubs. See also transient routine.

resident symbol sets
A type of font stored in a printer that has fewer attributes than can be specified for fully described fonts.

residual authority
A reference in the RACF database to a group name or user ID that has been deleted.

residual error
An error that is not detected by the network layer. Examples of residual errors are loss, corruption, duplication, and delivery out of sequence of TPDUs. See also signaled error.

residual group name
A reference in the RACF database to a group name that has been deleted.

residual RFQ
An RFx that is created for items that were not awarded in a particular round of procurement.

residual text
In DCF, the line of text following the markup/content separator of a GML tag.

residual user ID
A reference in the RACF database to a user ID that has been deleted. See also RACF remove ID utility.

The ability of an organization to anticipate, respond, and adapt to sudden disruption as well as opportunity. As tolerance for downtime decreases, resiliency ensures that businesses are able to continue operations, no matter what happens.

Resiliency Services
An IBM service line that supports clients in the maintenance of continuous business operations through assessments, processes, tools, and infrastructure designs that are responsive, available, and scalable.

resilient application
A server program that can be restarted on a different node without requiring a user to reconfigure the clients.

resilient resource
Data, a process, or an application that can be recovered if a node in a cluster fails.

To scale a font, for example, from 240 pels to 300 pels.

resize border
In CDE, a control used to change the size of a window or a pane in a window.

In IBM MQ for z/OS, an option that controls the number of user IDs checked for API-resource security.


  1. A measure of the sharpness of an image, expressed as the number of lines per unit of length or the number of points per unit of area discernible in that image.
  2. The process of distinguishing the individual parts of an object on screen, especially in font generation.

resolution correction
In architecture, a method used to present an image on a printer without changing the physical size or proportions of the image when the resolutions of the printer and the image are different.

resolution-correction ratio
In architecture, the ratio of a printer' physical resolution to an image presentation space' resolution.

resolution modification
In architecture, a method used to write an image on an image presentation space without changing the physical size of the image when the resolutions of the presentation space and the image are different.

resolution path
The set of queues that are opened when an application specifies an alias or a remote queue on input to an MQOPEN call.

resolution rule
A set of criteria that define how compared entities are resolved or related. See also candidate threshold.

resolution score
A value that is assigned during entity resolution as a result of the confirmation and denial processing and that defines the likelihood that the compared identities represent the same entity. This score is used to resolve a new identity to an existing entity. See also relationship score.


  1. To reconcile conflicts among change sets in a repository workspace.
  2. In programming, to change a predefined, symbolic value to the actual value of the item being processed. For example, a symbolic value of *LAST defined for the name of a file member is resolved to the name of the last member when the member is processed.
  3. To compare incoming identities and determine whether they represent an existing entity or a new entity. See also entity resolution.

resolved import
An import whose type and name exactly match the type and name of an export.

In TCP/IP, a program or subroutine that obtains information from a domain name server or a local table for use by an application program.

resolver routine
A kernel process used to resolve symbolic host names into Internet addresses. The method the routine uses to resolve names depends on whether the local network is organized as a flat network or as a hierarchical network.


  1. Any physical item or logical item to be managed in an information system of an enterprise.
  2. In a storage environment, an entity that is monitored. Resources can include fabrics, switches, computers, and storage systems.
  3. A logical or physical object that is useful for access governance and that can be associated to a certain user. For example, a resource can be a current bank account, a transmission device in a telecommunications system, a network folder, or a document.
  4. A user-defined construct that is based on the architectural model of IBM UrbanCode Deploy. A resource represents a deployment target.
  5. All of the functions and transactions that are both valid and available for an organization's role.
  6. A content repository object.
  7. A hardware, software, or data entity. See also managed resource, managed resource.
  8. Physical or logical system resources that are used as dependencies for jobs and job streams. See also resource dependency.
  9. In the context of OSLC, a network data object or service that can be identified by a URI.
  10. An XML fragment that is contained within an extended link that provides additional information about concepts or items.
  11. A cluster entity, such as a disk, file system, network interface, or application controller, that is made highly available in the cluster.
  12. See artifact.
  13. A collection of printing instructions used by Print Services Facility (PSF), in addition to the print data set, to produce the printed output.
  14. In Event Management, an entity in the system that provides a set of services. Examples of resources include hardware entities such as processors, disk drives, memory, and adapters, and software entities such as database applications, processes, and file systems. Each resource in the system has one or more attributes that define the state of the resource.
  15. A person who can be assigned to work breakdown structure (WBS) elements.
  16. A specific XML entity in an XML data source. A resource can be associated with an XML schema and can be used to map a data source to a relational database table to create reports.
  17. A facility of a computing system or operating system required by a job, task, or running program. Resources include main storage, input/output devices, the processing unit, data sets, files, libraries, folders, application servers, and control or processing programs.
  18. An instance of a physical or logical entity that provides services to some other component on the system. See also action.
  19. The collective term for projects, folders, subfolders, and files that can be manipulated in the Eclipse workbench.
  20. A physical or logical component that can be provisioned or reserved for an application or service instance. Examples of resources include database, accounts, and processor, memory, and storage limits.
  21. Any of several data structures included in a HATS project. HATS resources include templates, screen customizations, transformations, screen captures, connections, and macros. Other WebSphere Studio plug-ins sometimes call these "artifacts."
  22. A person, piece of equipment, or material that is used to perform an activity.
  23. The object of a lock or claim, which can be a table space, an index space, a data partition, an index partition, or a logical partition.

Resource Access Control Facility (RACF)
An IBM licensed program that provides access control by identifying users to the system; verifying users of the system; authorizing access to protected resources; logging unauthorized attempts to enter the system; and logging accesses to protected resources. See also command authorization.

resource access security
The use of RACF security classes to protect resources (PSBs, transactions, and output LTERMs) from unauthorized use by a dependent region.

resource adapter

  1. A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system (EIS). A resource adapter plugs in to a container; the application components deployed on the container then use the client API (exposed by adapter) or tool-generated, high-level abstractions to access the underlying EIS. (Sun) See also container, enterprise information system.
  2. Map input and output data sources that are used to retrieve and route data. Resource adapters provide access to databases, files, messaging systems, and other data sources and targets. Each adapter includes a set of adapter commands that can be used to customize its operation.
  3. An implementation of the Java Enterprise Edition Connector Architecture that allows JMS applications and message driven beans, running in an application server, to access the resources of an IBM MQ queue manager.

resource adapter archive (RAR)
A Java archive (JAR) file that is used to package a resource adapter for the Java 2 Connector (J2C) architecture.

resource allocation
The part of plan allocation that deals specifically with database resources.

resource allocation timeout value (R_A_TOV)
In Fibre Channel technology, a value used to time out operations that depend on the maximum possible time that a frame can be delayed in a fabric and still be delivered. This value is adjustable in one microsecond increments from 10 - 120 seconds. See also resource recovery timeout value.

resource attribute
A characteristic of a system resource. The types of resource attributes are persistent attributes and dynamic attributes. See also resource group policies.

resource binding
A set of hardware resources that are identified by the operating system. See also resource group, resource policy.

resource bundle

  1. A structured collection of data that provides a key-value mapping for data (resources) used in localizing a program. The values are commonly strings, but may themselves be structured data. See also locale.
  2. A class that contains the text for the store pages. Bundle files are created and accessed according to the Java PropertyResourceBundle API.

resource caching
In IPDS architecture, a function in a printer or intermediate device whereby downloaded resources are captured and made resident in the printer or intermediate device.

resource calendar

  1. A calendar selected from a base calendar and associated to a resource, used to represent the resource availability. A resource calendar can be modified to record the non-working days of the resource.
  2. A calendar that is created when a resource is created or added to a project.

resource class

  1. A category of similar resources that are defined in the RACF class descriptor table (CDT).
  2. A group of resources that have attributes, actions, and other characteristics in common.
  3. An attribute of a resource that is used to group resources according to the subsystem to which they belong and the purpose for which they are used.
  4. A set of resources of the same type. A resource class defines the common characteristics of instances in a resource class. See also action.

resource collection
Jython objects that represent collections of resources which have a specific characteristic in common.

resource-constrained condition
The situation that occurs when the printer does not have enough storage for the resources required to print the current page.

resource control block (RCB)

resource control table (RCT)
A DB2 control table that defines the relationship between CICS transactions and DB2 resources.

resource database
The database assembled for a particular combination of display, host, and application. It can contain information from several sources.

resource definition

  1. A subset of content repository resources used to enable analytical processing, such as definitions of data sources, credentials, execution servers, and JMS message domains.
  2. See data set definition.
  3. A library member containing the set of records that collectively define a resource.
  4. See library definition.

resource definition data set (RDDS)
A data set that manages IMS resources. IMS systems have options to export resources that are defined by the system definition process and resources that have been created or updated dynamically, into the RDDS. These resources can then be imported from the RDDS into an IMS system during cold start processing or through the use of an IMPORT command.

resource definition macro (RDM)
A method of defining resources to CICS by using assembler macros. You code and assemble special CICS macros and present the assembler output to CICS at system initialization.

resource definition member
A member in the IMS.PROCLIB data set that defines the resource definition data set (RDDS) to IMS.

resource definition online (RDO)
A method for defining CICS resources interactively while CICS is running.

resource definition table (RDT)
In VTAM, a table that describes the characteristics of each node available to VTAM and associates each node with a network address. This is the main VTAM network configuration table.

resource dependency
A dependency where a job or job stream cannot start until the required quantity of the defined resource is available. See also dependency, resource.

Resource Description Framework (RDF)
A framework for representing information on the web. See also RDF Site Summary.

resource descriptor
A template in which the attributes for a resource are defined.

resource distribution report
A report, generated by the Customization Definition Program (CDP), that describes the resources required by an instance.

resource element
A component of an Intelligent Network that contains specialized resources such as speech recognizers or text-to-speech converters.

resource environment reference
A reference that maps a logical name used by the client application to the physical name of an object.

resource error counters
In OSI, counters that keep track of errors that occur in layers and other resources.

resource file
A file that is used to create, in a runtime environment, one or more resources of a particular class.

Resource Framework Definition (RDF)
A framework for representing information on the web. See also RDF store.

resource group

  1. A collection of XML sources from a product that share a common base web address. The web address determines the connection between the product data and the relational database that is used to create reports.
  2. A set of cluster resources that is configured by the user and handled as one unit. See also concurrent resource group, delayed fallback timer, dependent resource groups, distribution policy, location dependency, node list, nonconcurrent resource group, resource group policies, settling time, startup, takeover priority.
  3. A group of resources that can include business objects such as contracts or a set of related commands. In access control policies, resource groups specify the resources to which the policy authorizes access.
  4. A collection of structured fields that describe the attributes of a resource such as a volume.
  5. A set of resource bindings. See also resource binding, resource policy.

resource group class
A type of RACF class in which each user or group of users that is permitted access to that resource group is permitted access to all members of the resource group. See also resource group profile, resource member class.

resource grouping class
A class used to define multiple resources with a similar set of access control rules.

resource group management
The process by which resource groups are moved from one node to another, or taken offline or online while the cluster is running. See also resource group migration.

resource group migration
Movement of a resource group from one node to another without a fallover. See also resource group management.

resource group policies
A set of predefined policies that define how a resource group behaves during startup, fallover, and fallback. Different combinations of startup, fallover, and fallback policies for a resource group can be specified. See also concurrent resource group, delayed fallback timer, dependent resource groups, distribution policy, dynamic node priority policy, fallback, fallover, node priority policy, nonconcurrent resource group, resource attribute, resource group, settling time, startup, takeover priority.

resource group profile
A general resource profile in a resource group class. A resource group profile provides RACF protection for one or more resources with unlike names. See also resource group class.

resource hierarchy
In VTAM, the relationship among network resources in which some resources are subordinate to others as a result of their position in the network structure and architecture. For example, the logical units (LUs) of a peripheral physical unit (PU) are subordinate to that PU, which, in turn, is subordinate to the link attaching it to its subarea node.

resource ID
The programmable list entry ID that IMS specifies for a resource to ensure name uniqueness. The first byte is the name type, and the remaining 11 bytes are the resource name, padded with blanks.

resource identifier

  1. In Event Management, a name/value pair that uniquely identifies the resource (and by extension, the copy of the resource variable) in the system.
  2. The portion of a resource name that uniquely identifies the resource.
  3. In Enhanced X-Windows, an integer returned to an application program that identifies a resource that has been allocated for the program's use.

Resource Interchange File Format (RIFF)
A file format used for storing sound or graphics for playback on different types of computer equipment.

resource inventory
A list of all of the components that are deployed to an agent resource. See also component inventory.

resource label
In the NetView Graphic Monitor Facility, the textual information that identifies a particular aggregate or real resource. The resource label is displayed next to the resource symbol, and it cannot be changed by the network operator.

resource level
The hierarchical position of a device (and the software that is contained within it) in a data processing system. For example, a first-level resource could be the communication controller, and the second-level resource could be the line connected to it.

resource leveling
During plan scheduling, the process of resolving over-allocated resources by delaying tasks until the assigned resources are available to work on them.

resource limit facility (RLF)
A portion of DB2 code that prevents dynamic manipulative SQL statements from exceeding specified time limits. The resource limit facility is sometimes called the governor.

resource limit specification table
A site-defined table that specifies the limits to be enforced by the resource limit facility.

Resource Link
A customized web-based solution, providing access to information for planning, installing, and maintaining IBM Systems and IBM S/390 servers and associated software.

resource management

  1. In CICS, a facility that tracks what system resources are being used. The tracking is done by mapping the CICS identification name to the underlying system resources.
  2. The function that protects serially accessed resources from concurrent access by competing tasks.

Resource Management Facility (RMF)
Software that measures and reports on the performance and availability of a system.

resource management utility (RMU)
In AFP Utilities, an interactive tool used to maintain AFP resources.

Resource Manager (RM)
A Common Service Layer (CSL) component that manages resources and coordinates online change for IMSs in an IMSplex.

resource manager

  1. In the Tivoli common agent services, the server of a management application that directly interacts with a managed resource. For example, a resource manager installs bundles on the agent and starts and stops a subagent. See also management application.
  2. A participant, in the execution of a one-phase or two-phase commit, that has recoverable resources that could have been modified. The resource manager has access to a recovery log so that it can commit or roll back the effects of the logical unit of work to the recoverable resources.
  3. A stand-alone daemon that maps resource and resource class abstractions into calls and commands for one or more specific types of resources.
  4. The component of a Content Manager system that manages objects. These objects are referred to by items stored on the library server.
  5. A function that is responsible for managing a particular resource and that guarantees the consistency of all updates made to recoverable resources within a logical unit of work. The resource that is being managed can be physical (for example, disk or main storage) or logical (for example, a particular type of system service).
  6. A subsystem or component that manages resources that can be involved in transactions. Resource managers can be categorized as work managers, data resource managers, and communication resource managers.
  7. The participant in a transaction responsible for controlling access to recoverable resources. In terms of the CICS resource adapters this is presented by an instance of a ConnectionFactory.
  8. In an XA-enabled environment, software that manages and provides access to shared resources, such as databases. The DB2 database system is an example of a resource manager.
  9. An application, program, or transaction that manages and controls access to shared resources such as memory buffers and data sets. IBM MQ, CICS, and IMS are resource managers.

resource manager cache
The working storage area for the resource manager.

resource manager interface (RMI)
A program or a group of programs that you write to enable you to structure calls from your CICS system in such a way that they can access non-CICS resources, such as databases, that you would not normally be able to access. See also task-related user exit.

resource manager local transaction (RMLT)
A resource manager view of a local transaction that represents a unit of recovery on a single connection that is managed by the resource manager.

Resource Measurement Facility (RMF)
A feature of z/OS that measures selected areas of system activity and presents the data collected in the format of printed reports, System Management Facility (SMF) records, or display reports.

resource member class
A class to which a resource group class is related. See also resource group class.

resource minimum
Specifies the minimum percentage of Netezza system resources to allocate to the group when the group has active jobs on the system.

resource model
A model that defines the resources used in business operations, including their roles, availability, and cost characteristics.

resource monitor
A program that supplies information about resources in the system. A resource monitor can be a command, a daemon, or part of an application or subsystem that manages any type of system resource.

resource monitoring
The measurement of resource usage such as processor, physical memory, network traffic in and out, and battery of the mobile device and the application under test.

Resource Monitoring and Control (RMC)
A subsystem that runs on each cluster node and provides global access to subsystems and resources throughout the cluster, thus providing a single monitoring and management infrastructure.

resource-monitor threshold
The point at which a resource monitor generates an event.

resource name

  1. An 11-byte unique name of a client-defined resource. A transaction is an example of an IMS resource name.
  2. The name under which an AFP resource object is stored, the first 2 characters of which indicate the resource type.
  3. A name assigned by the system to a line, controller, or device that is connected to the system.

resource object

  1. In AFP, a collection of printing instructions, and sometimes data to be printed, that consists entirely of structured fields. A resource object is stored as a member (or file) of a library and can be called for by PSF when needed. The different resource objects are: coded font, font character set, code page, page segment, overlay, form definition, and page definition.
  2. A resource used in the Network Installation Management environment that represents a file or directory.

Resource Object Data Manager (RODM)
In Tivoli NetView for z/OS, a component that provides an in-memory cache for maintaining real-time data in an address space that is accessible by multiple applications.

resource outage
The inability to obtain the necessary resources, such as links, buffers, or control block storage.

resource owner
A user that is capable of authorizing access to a protected resource.

resource policy
An element in the resource policy file that defines the resource bindings and resource groups to be used by a DB2 instance or database and can also contain rules for assigning DB2 database objects to resource bindings. See also resource binding, resource group, resource policy file.

resource policy file
A configuration file that contains the resource policy for an instance or database and can also contain a scheduling policy for an instance. See also resource policy, scheduling policy.

resource pool

  1. A logical collection of resources identified to complete delivery or provided services.
  2. A group of people who are available to work on a project.
  3. A collection of available servers (servers that are not allocated) that support one or more application tiers.

resource profile
A profile that provides RACF protection for one or more resources. The information in a resource profile can include the data set profile name, profile owner, universal access authority, access list, and other data. Resource profiles can be discrete profiles or generic profiles. User, group, and connect profiles are not resource profiles. See also discrete profile, generic profile.

resource property

  1. A characteristic of a system, project, subproject, or file.
  2. A property for a JDBC data source in a server configuration, for example the server name, user ID, or password.
  3. A piece of information that is associated with a Web Services Resource (WS-Resource) that can reflect the state of a resource, the metadata, or the manageability interface information. See also Web Services Resource.

resource protection
The system function of enqueueing on a resource to provide exclusive control of that resource to a transaction until the end of a logical unit of work.

resource record (RR)
In a Domain Name System (DNS), a location where data is stored.

Resource Recovery Services (RRS)
A component of z/OS that uses a sync point manager to coordinate changes among participating resource managers.

Resource Recovery Services attachment facility (RRSAF)
A DB2 subcomponent that uses Resource Recovery Services to coordinate resource commitment between DB2 and all other resource managers that also use RRS in a z/OS system. See also call attachment facility.

resource recovery timeout value (RR_TOV)
In Fibre Channel networks, the minimum time a target device in a loop waits after a loop initialization primitive (LIP) before logging out a small computer system interface (SCSI) initiator. See also error detect timeout value, resource allocation timeout value.

resource region
In CICS distributed program link, a CICS region to which an application region ships a LINK PROGRAM request.

resource registration
The process of identifying names of resources, such as LUs, to a network node server or a central directory server.

resource registry
A registry services directory of resources that are managed or tracked by multiple products across different domains.

resource requirement
Prerequisites such as the amount of memory, the size of the hard disk and so on for virtual server templates.

resource reservation
A request for an application or for extra servers that is scheduled for a specified period. Reservation requests are not guaranteed, but they influence deployment decisions.

Resource Reservations database
The component of Domino calendar scheduling used to schedule meeting resources such as conference rooms and equipment.

resource reservation setup protocol
An Internet protocol that is used for communicating application (end-to-end) quality-of-service requirements to intermediate transit nodes in a network. RSVP uses a soft-state mechanism to maintain path and reservation states in each node in the reservation path.

resource resolution table (RRT)
In Tivoli NetView Performance Monitor, a table that contains the names of the network resources for which data is to be collected. The resource resolution table corresponds with a network control program (NCP) and is built by NetView Performance Monitor Global Enterprise Manager from an NCP Stage I and an NCP resource resolution table.

resource security

  1. A security function of the operating system used to authorize users to any part of the system that is required by a job or task.
  2. In CICS Transaction Server, the facility provided by CICS and RACF for the control of access to resources protected by RACF security classes. The resources that can be protected include transactions, data sets, and transient data destinations.

resource sequence number (RSN)
A value that identifies an update of a resource in a network topology database.

resource server
A server that hosts protected resources.

resource set (RSet)

  1. A data structure in AIX 5L used to represent physical resources such as processors and memory. AIX uses resource sets to restrict a set of processes to a subset of the system's physical resources.
  2. A collection of resources that are members of the same class and that share a common scope. A resource set also determines which other resource sets are its prerequisites and which place holders are used within the corresponding resource file templates.

resource shape
A specification that defines a fixed list of properties for the resource, expected data types and values, and validation rules for new or changed resources. See also shape document.

resource signature
In a CICS resource, the combination of the definition signature and the installation signature. See also definition signature, installation signature.

resource state
A state that indicates that the resource is either available or unavailable for use.

resource status collector
A function of the NetView program that collects status information on monitored resources and forwards this information to the resource status manager.

resource status manager
The part of the NetView Graphic Monitor Facility that maintains a database of SNA resource status information and that forwards this information to all attached server workstations.

resource string
A parameter, such as a part of the program name, that identifies an application's resources.

resource structure
A coupling facility list structure, used by the Common Service Layer's Resource Manager and managed by CQS, that contains uniquely named resources. This structure is typically used to maintain global resource information when multiple Resource Managers exist in an IMSplex.

resource symbol
In the NetView Graphic Monitor Facility, a geometric shape that represents a particular kind of resource and that indicates whether that resource is an aggregate resource. A square, for example, represents a host.

resource tables
Related types of resource information that are stored within CICS in tables or control blocks.

resource tag
A name that is used to assign a group of resources to another group for quickly gathering an export package, such as moving a group of resources from one instance to another.

resource takeover
In VTAM, an action initiated by a network operator to transfer control of resources from one domain to another without breaking the connections or disrupting existing LU-LU sessions on the connection. See also acquire, release.

resource target share
The shares of a resource that should be available to a Workload Management class. These shares are used with other class shares to determine the desired distribution of the resources between classes.

resource token (RTOKEN)
A token that represents the security characteristics of a resource. See also security token, user token.

resource type

  1. In the context of OSLC, the type of data that is linked between integrated applications, for example, a change request.
  2. A well-defined syntax and semantics that characterize all instances of a given kind of resource. See also managed resource prototype.
  3. A characteristic of a console resource that indicates the relationship of the console resource to the operation of the console. See also core resource, custom resource, system resource.
  4. A resource that is defined by CQS. CQS groups list headers into resource types. The resource types allow CQS and its clients to physically group resources of a particular type on a coupling facility list structure.

resource value
A resource determines the operation and the attributes of a widget or a window, such as color and behavior. Each resource is associated with a value list.

resource value unit (RVU)
A unit of measure by which a program can be licensed that is based on the number of units of a specific resource used or managed by the program.

resource variable
In Event Management, the representation of an attribute of a resource. An example of a resource variable is IBM.AIX.PagSp.%totalfree, which represents the percentage of total free paging space. IBM.AIX.PagSp specifies the resource name and %totalfree specifies the resource attribute.

responded output
In VTAM, a type of output request that is completed when a response is returned.

A user role that is responsible for answering questions during assessments.


  1. A key server that is asked to establish a dynamic virtual private network (VPN) connection between two endpoints.
  2. In distributed queuing, a program that replies to network connection requests from another system. See also initiator.
  3. In OSI Communications Subsystem, the application entity that accepts an application association. See also initiator.


  1. In speech recognition, the character string returned by the recognizer, through DVT_Client, to the state table. The string represents the outcome of a recognition attempt. This is the word or words that the recognizer considers to be the best match with the speech input.
  2. A return message to a computer that made a request. After capturing a request, the PCA server then processes and assembles packets in search of the response to that request. A response may be in text or binary form.
  3. In SNA, a message unit that acknowledges receipt of a request; a response consists of a response header (RH), a response unit (RU), or both.
  4. In a request/response interaction, a message from a connector to a collaboration that carries the results of a request made by the collaboration. The message can be either a business object or a response code.
  5. The texts that make up the list of possible responses to a categorical question or a grid question. See also text.
  6. In OSI, a service primitive issued by a service user to complete the procedures associated with a confirmed service. See also command.
  7. In data communication, a reply that is represented in the control field of a response frame. It advises the primary or combined station of the action taken by the secondary or other combined station to one or more commands. See also command.
  8. A choice that a user selects from a predetermined list when processing a work item. A response can determine the route that work will subsequently follow.
  9. In SDLC, a frame transmitted by a secondary station. Stations using asynchronous balanced mode send both commands and responses.
  10. The reaction of an appliance to an event. Responses include sending an email message to a responsible party, triggering an SNMP trap, creating a log of the activity, quarantining the activity, or using a custom (user-specified) action, such as running an application or running a command.
  11. A message inserted to a logical terminal destination specified by an I/O PCB or an alternate response PCB. When VTAM is used, the term reply is substituted for response because response has a separate meaning in VTAM communications. See also primary request, secondary request.

response action
The code that identifies specific actions taken when responses to negotiation are made between two organizations.

response alternate PCB
See alternate response PCB.

response document
In Notes, a document created using a Response form, a typical component of a discussion database. In a view, response documents are usually indented underneath the document to which they respond.

response file

  1. A file containing predefined values that is used instead of someone having to enter those values one at a time. See also CID methodology, manifest file, silent installation.
  2. A file that can be customized with the setup and configuration data that automates an installation. During an interactive installation, the setup and configuration data must be entered, but with a response file, the installation can proceed without any intervention.

response file generator
A utility that creates a response file from an existing installed and configured DB2 product. The generated response file can be used to re-create the same setup on other computers.

response flow
The flow of the message from the service provider to the service requester.

response frame
A frame that is transmitted by a secondary station or a frame that is transmitted by a combined station that contains the address of the transmitting combined station.

response generator binding
A definition of the security requests for the response message that is sent to a web service.

response header (RH)
In SNA, a header, optionally followed by a response unit, that indicates whether the response is positive or negative and that may contain a pacing response. See also negative response, pacing response, positive response, request header.

response history
The historical record of responses to campaigns, either by targeted respondents or by holdouts.

response indicator
A 1-character field passed with an input record from the system to a program to provide information about the data record or actions taken by the workstation user.

response level
The state of a monitor when a specified threshold is reached.

response mode
A mode of terminal operation that synchronizes operations between the terminal operator and the application program. See also line response mode, nonresponse mode, terminal response mode.

response multiplier
A method that is used to record a quantity or frequency that is associated with a response, for example, “Do you buy product A, product B, or product C? If so, how often do you buy the product?”

response package
A series of deliverables and tasks required to manage or mitigate the effects of an exception such as an issue, change request or risk.

response plan
A template that is used to automate a series of actions for similar job plans and work orders, such as consistently assigning the same person or groups to similar work orders and sending notifications to those persons or groups.

response receiver binding
A definition of the security requirements for the response message that is received from a request to a web service.

response sender binding
A definition of the security requirements for the response message that is sent to a web service.

response time

  1. The time that an application spends in processing a request.
  2. For response time monitoring, the time from the activation of a transaction until a response is received, according to the response time definition coded in the performance class.
  3. In capacity planning, the elapsed time between the end of an inquiry or demand on a computer system and the beginning of the response. An example of response time is the length of time between an indication of the end of inquiry and the display of the first character of the response at a user's workstation.
  4. The elapsed time between entering an inquiry or request and receiving a response.

response time goal
A service class performance goal that defines end-to-end response time of work requests.

response time monitor (RTM)
A feature available with certain hardware devices to allow measurement of response times, which can be collected and displayed.

response unit (RU)

  1. In SNA, the record sent to respond to a request. The response can be either positive or negative and can include control information.
  2. A message unit that acknowledges a request unit. It can contain prefix information received in a request unit.

response variable
A variable that stores the responses to a question.

responsibility area
An area that defines roles, skill sets, experiences, or other responsibilities that a purchaser has for suppliers, categories, business units, or regions.

Key differentiating property of an on-demand business which is able to respond almost intuitively to dynamic, unpredictable changes in demand, supply, pricing, labor, competitors' moves, capital markets, and the needs of all its constituencies -- customers, partners, suppliers, and employees.

responsive web design (RWD)
A web design approach that responds to the user's behavior and environment based on the device, browser, screen size, orientation, and underlying operating system being used to access the application.

See resident queue.

See Representational State Transfer.

An application programming interface that defines the architectural design principals used to create web services. See also application programming interface.


  1. A process that resends an inbound batch through the network for complete reprocessing.
  2. Resumption of operation after recovery. Ability to restart requires knowledge of where to start and ability to start at that point.

A property of an operation that can automatically be restarted, if the workstation that it is using becomes inactive. This option applies only to the operation while it has status S (started). The operation is reset to status R (ready).

restart and cleanup (RC)
A recovery function that ensures the restart of a job and the related cleanup actions, for example, deleting or uncataloging data sets created in a job run.

restart attribute
An attribute that specifies that processing of the input data should continue even though a data object of the component is invalid. The restart attribute provides instructions for handling errors encountered in a data stream and can be assigned to a component within a group type.

restart data set (RDS)

  1. The direct-access data set used to contain the information necessary to restart IMS.
  2. A VSAM KSDS used only during a CICS emergency restart. The RSD temporarily holds the backout information read from the CICS system log. This allows CICS to be restored to a stable state and to be restarted following an abrupt termination.

restart group
A group of related jobs, registered as elements of automatic restart management, that must be restarted together on the same system if a system fails unexpectedly.

restart light
The act of restarting a member on a host other than its home host for the sole purpose of performing member crash recovery on each database as required. See also guest member.

restart pending (RESTP)
A restrictive state of a page set or partition that indicates that restart (backout) work must be performed on the object.

restart queue
A local queue that holds restart information for each send queue that a Q Capture program uses. The Q Capture program uses the information to determine where to start reading in the DB2 recovery log after a restart.

Pertaining to applications and services that conform to Representational State Transfer (REST) constraints. See also Representational State Transfer.

The process a company takes to take back an item that has been returned by a customer and place it back in their inventory.

The process of copying information from its backup location to the active storage location for use. The backup version in the storage pool is not affected by the restore operation.


  1. To copy information from its backup location to the active storage location for use. For example, to copy information from server storage to a client workstation. See also back up.
  2. To copy data from compact disc, tape, diskette, optical disc, or a save file to auxiliary storage. See also save.
  3. To rebuild a damaged or corrupted database or table space from a backup image produced with the backup database utility.
  4. To return to an original value or image, for example, to restore data to main storage from auxiliary storage.
  5. To revert a withdrawn or terminated contract to its prior status.

restore point
A point in time when an instance was in a consistent state.

restore set
A backup copy of a database or table space plus zero or more log files that, when restored and rolled forward, bring the database or table space back to a consistent state.

See restart pending.

restricted IP option
An IP option, such as Loose Source and Record Route (LSRR), that is used to map a network's topology and discover private IP addresses. A hacker might try to use a restricted IP option to get through a firewall.

restricted IP protocol
An undefined IP protocol that can be used to establish an attack on a network.

restricted response
In X.25 communications, when restricted response is specified for a fast-select call, the call must be cleared; it may not be accepted.

restricted shell
A facility that provides controlled, limited access to specified users.

restricted state
The status in which a user places a system (by ending all subsystems) to do a specific function, such as saving storage, saving the system, or restoring user profiles. Other jobs cannot be active on the system while it is in a restricted state.

A type of filter that limits a scan to listed URLs only.

restrictive test
A test that filters the results returned by a contributing test question.

To redistribute and rebalance data across all available and defined disks in a multimedia file system. This is typically done when a disk is removed from a file system for repair or when a new disk is added to a file system.

Restructured Extended Executor (REXX)

  1. A general-purpose, high-level programming language, particularly suitable for EXEC procedures or programs for personal computing.
  2. The i5/OS implementation of the Systems Application Architecture Procedures Language. REXX is a programming language that is supported by an interpreter provided as part of the i5/OS licensed program.


  1. See edge.
  2. In a policy-enabled system, a solicited decision that contains one or more specific data values, called result values.
  3. The consequence of reaching an end event. Types of results include message, error, compensation, and signal. There can be multiple results, such as a result that produces a message and another result that sends a signal.

A REXX special variable that is set by the RETURN instruction in a called routine. The RESULT special variable is dropped if the called routine does not return a value.

result class
A user-defined class that designates performance evaluation results.

result column

  1. The set of columns that DB2 for i5/OS SQL selects for an application program.
  2. A set of column values that is generated by an expression that contains one or more columns.

result destination
In Query Patroller, the location where the results of a query are returned. The result destination can be either the application through which the query was submitted or a result table.

result event
An action that is generated by the technology connectors and sent back to the runtime server to be processed as a new event.

result field
In Query, a field that contains the results of calculations performed on numeric fields in a file.

resulting indicator
In RPG, an indicator that signals the result of a calculation, such as whether the result is plus, minus, or zero; whether a given field is greater than, less than, or equal to another field; or whether an operation was successfully completed.

results algorithm
An algorithm that manipulates the return codes of batch jobs or provides placeholders for triggers that are based on batch step return codes. A results algorithm is applied to batch steps in a batch application by using xJCL. See also checkpoint algorithm, xJCL.

result set

  1. The information returned to a model by a call to a back-end data source, like a service call or database query.
  2. A visible subset of items, such as workflows or documents, returned by a search. The user can set the size of the result set.
  3. A set of row values as returned by, for example, a cursor or procedure. See also result table.

result set locator
A value used by a DB2 application to uniquely identify a query result set returned by a procedure.

result state
The state following each of the possible results of an action.

result table
The set of rows produced by the evaluation of a SELECT statement. See also base table, result set, temporary table.

result tree
The output document that is created when an XSL file is used to transform an XML file.


  1. A candidate's set of accomplishments.
  2. To revert a decline action in order to continue contract negotiation.
  3. To continue execution of an application after an activity has been suspended.
  4. To reinstate a previously suspended change set to a repository workspace.

resume cursor

  1. The point in an application at which execution should continue if a condition handler requests the resume action for a condition it is processing.
  2. A pointer that tracks the current location at which the exception handler may resume processing after handling an exception.

resume image
The PDF file image of a resume.

resume pending state
In cross-site mirroring, the configuration state of a mirror copy that indicates that geographic mirroring requires synchronization but that the disk pool is currently unavailable. When the disk pool is made available, the mirror copy will be synchronized with the current information on the production copy.

resume point
An instruction in a program where processing continues after handling an exception.

resuming state
In cross-site mirroring, the configuration state of the mirror copy that attempts to perform geographic mirroring and synchronization when the independent disk pool is available. The mirror copy state is resuming when it is not suspended or active.

In IBM MQ, an option to direct a channel to start and resolve any in-doubt status messages, but without restarting message transfer.


  1. In OSI, a function of the session layer that enables two peers to coordinate the exchange of data to a previously marked point. This point was marked using the major or minor synchronization service. Resynchronization will normally be performed after a problem is detected by an application entity or indicated by the session layer.
  2. A track image copy from the primary volume to the secondary volume of only the tracks that have changed since the volume was last in duplex mode.
  3. The completion of an interrupted two-phase commit process for a unit of work.

retail communications
The data communications support that allows programs on a System i system to communicate with programs on point-of-sale systems, using SNA LU session type 0 protocol.

retail controller
In retail communications and Point-of-Sale Utility, a controller in a network that is used to collect data from and provide support for the point-of-sale and administrative devices within the retail system. The retail controller also provides some local data processing capabilities.

retail pass-through
An i5/OS program that supports routing of user data between a System/370-type host processor and a retail controller using a single System i system. Both the SNA upline facility and the retail communications support use separate intersystem communications function sessions.

retail price
The price that a consumer pays for a product.

See Remote Technical Assistance and Information Network.

The disposition of a job that saves the job in the print queue. These jobs remain in the print queue until they are canceled.

retained lock

  1. A method for protecting transaction updates when a problem delays transaction recovery of the updates. The retained status is cleared when transaction recovery is completed.
  2. A MODIFY lock that a DB2 subsystem was holding at the time of a subsystem failure. The lock is retained in the coupling facility lock structure across a DB2 for z/OS failure.


  1. The amount of time, in days, that inactive backed-up or archived files are kept in the storage pool before they are deleted. Copy group attributes and default retention grace periods for the domain define retention.
  2. The process of storing a document, record, or other information type for a period that is determined by an event-based or time-based policy.
  3. In Backup, Recovery, and Media Services, the total length of time that the output media is to be saved as a backup or archive copy before it is expired (available for reuse). Retention can be specified as a date, number of days, versions, or permanent. Different retention periods can be specified for full backups, incremental backups, or archive output.

retention date
In DFSMSrmm, the date until which a data set or volume is retained by a vital record specification.

retention hold
A setting that is used to indefinitely postpone the expiration of a document.

retention-limit pruning
In SQL replication, the pruning of CD and unit-of-work tables by the Capture program that are older than a limit that the user specifies.

retention management
A policy that a company places on the documents and content that are created and saved during its normal course of business. Full records management is required to meet statutory and regulatory obligations. Simple Retention management is sufficient for most other business requirements.

retention period

  1. A period in a disposition phase that specifies the length of time between cutoff and the phase action. A disposition schedule can have several phases of retention, each with its own retention period.
  2. The length of time that data should be kept in a certain location or form.
  3. A formula that specifies the amount of time that a particular type of information must be retained. The formula is in the form "event + duration." For example, an employment contract might need to be retained for five years after termination ("termination + five years"), transfer of ownership forever ("no event + forever"). Retention schedules are defined in master and local schedules.

retention policy
A policy that identifies the record retention responsibilities of employees and others for maintaining and documenting the storage and destruction of the organization's documents and records.

retention schedule

  1. A schedule that describes how long a certain type of document (or record) must be retained.
  2. See disposition schedule.

retention server
The location where retained data objects are kept. Retention servers must be configured before retention volumes to are added IBM StoredIQ Platform.

retention storage
The management of data on compliant immutable storage of documents for a specific period and for records on hold.

retention type
The kinds of retention for which DFSMSrmm keeps a volume or data set before considering it for release.

retention volume
Immutable storage that enforces retention and hold policies.

RetePlus mode
A rule execution mode for matching patterns with objects. The RetePlus mode is used by the rule engine to minimize the number of rules and conditions that need to be evaluated, compute which rules should be executed, and identify in which order these rules should be fired.

Pertaining to a field or value that has been withdrawn from use while still compatible with an existing product because it is not compliant with or has been removed from the architecture.

retired version
A specially marked backup version that DFSMShsm created before it deleted the original data set, not managed with the storage management subsystem (SMS), during data set retirement.

To remove the reference to the home of the bean in a namespace. Retract reverses the action of publish.

The action of removing an object bound to a rule variable from the working memory.

To repeat the transmission of a message or segment of a message.

retrieval time
The time interval required to locate data in storage and read it for subsequent processing.


  1. To locate data in storage and read it so that it can be processed, printed, or displayed.
  2. To copy archived information from the storage pool to the workstation for use. The retrieve operation does not affect the archive version in the storage pool. See also archive.

A web application that provides access to stored recordings.

To change an existing program or system by adding or replacing a section of code or a physical unit and making necessary modifications to related units.

The provision of national language support to an existing product by redesigning and rewriting part or all of its code.

In agile development, a meeting or a work item that evaluates successes and needed improvements after a sprint.

Pertaining to that which resends data a prescribed number of times or until the data is received correctly, for example, a retry option or a retry loop.


  1. To remove the call stack entry and transfer control back to the calling procedure or program in the previous call stack entry.
  2. A product that has been shipped to a customer and shipped back by the customer for various reasons (damaged goods, incorrect items).
  3. One or more products, their prices, and the quantity specified, that a customer has selected for a refund from the store in which the product was originally purchased.

return address
In architecture, the address of the order following a Call Segment order, that is pushed onto the segment call stack at call time. This enables a return from the called segment so that processing can resume with that order.

return authorization (RA)
The return number applied to returned products.

return avoidance
The act of avoiding a return, by either price matching an item or appeasing the customer.

return code (RC)
A value returned by a program to indicate the result of its processing. Completion codes and reason codes are examples of return codes.

return disposition
The disposition code that determines the product classification and inventory status of the returned items.

return indicator
An indicator to an RPG program that control should be returned to the calling program.

return material authorization (RMA)
The identifying control number assigned to a return order from a customer.

return merchandise authorization (RMA)
Authorization from the seller for a customer to return products ordered from a store and receive a credit, refund, or replacement product. At the seller's discretion, a product does not need to be returned in order to receive a credit, refund, or replacement product.

return method
The method that a customer uses to return items to the corresponding enterprise.

return on investment (ROI)
The amount of profit or cost saving that is realized for a given expenditure.

return pickup service
A service that is used to define a pickup service from a customer if the customer wants to return the item.

return policy
The policy defined by an enterprise to return items, for example, "Returns must take place within 30 days of purchase."

return reason
The code that identifies why items are returned.

returns administrator
A defined role in WebSphere Commerce that manages the disposition of returned products. See also logistics manager.

return statement
A control statement in a programming language that contains the word "return" followed by an optional expression and a semicolon.

An option available to an MCA that is unable to deliver a message. The MCA can send the message back to the originator.

return value
See return code.

return window
The number of days, as defined by the enterprise, to return an item to a store.

retweet (RT)

  1. A reposted or forwarded tweet that is shared with one's followers on Twitter.
  2. To repost or forward a tweet in order to share it with one's followers on Twitter.

retype verification
A type of verification that requires the user to reenter the data to be verified.

Reusable Asset Specification
A specification that describes processes for reusing software assets (modules or applications) for application development.

reusable data set
A Virtual Storage Access Method (VSAM) data set that can be reused as a work file, regardless of its old contents. It must not be a base cluster of an alternate index.

The monies that are received for products or services rendered to customers.

revenue leakage
An unnecessary loss in revenue that is typically the result of an error or oversight, such as incorrect billing or reporting.

revenue lift
A statistical method that predicts how much revenue will be generated as a function of another variable, such as a promotion.

revenue model innovation
Innovating how we generate revenue through offering re-configuration (product/service/value mix) and pricing models. See also enterprise model innovation, industry model innovation.

Reverse Address Resolution Protocol (RARP)
In TCP/IP networking, a protocol by which a diskless machine can obtain its IP address from a RARP server. The diskless machine broadcasts a request and its physical hardware address. The RARP server responds by returning an IP address based on the physical address. See also address resolution, Address Resolution Protocol.

reverse charging
In X.25, a packet-switching data network optional facility that allows the data terminal equipment (DTE) to request that the cost of a communications session be charged to the DTE that is called.

reverse data type mapping
In a federated system, the mapping of a DB2 data type to a comparable data type at a remote data source. For most data sources, the default reverse data type mappings are in the wrappers. See also data type mapping, forward data type mapping.

reversed presentation
A category or subquestion list that is presented top-down to some of the respondents and reversed (bottom-up) to the others. Reversed presentation is typically incorporated in an attempt to reduce bias.

reverse engineer
To analyze a device or system in order to learn details of its design, construction, and operation.

reverse explicit route
An explicit route that terminates in the host and must use the same set of subarea nodes and transmission groups as their corresponding forward explicit route.

reverse geocoding
The process of identifying more traditional geographic markers (addresses, postal codes, and so on) from geocodes. For example, a search for the geocode "43.641619,-79.389138" gets reverse geocoded to the Rogers Centre (a landmark). See also geocoding, geolocation, Geospatial Entity Object Code, geotagging, global positioning system, radiolocation.

reverse heading
A heading where each character is highlighted by reversing the color of the character with its background, for example, changing a black character on a white background to a white character on a black background.

reverse image
Text that appears on the display in the opposite color (for example, black on green instead of green on black).

reverse-interrupt character (RVI character)
The BSC transmission control character that is sent as a request from the receiving station to the sending station to stop transmitting and begin receiving a message.

reverse journal
A function that allows the user to eliminate a journal without having to re-book values manually.

reverse logistics
The strategy of managing and controlling orders returned from customers to refurbish, if needed, and be placed back into the status of a saleable product.

reverse logistics pipeline
The flow of transactions required to manage and control orders returned from customers to refurbish, if needed, and be placed back into the status of a saleable product.

reverse mandatory access check
A mandatory access check in which the security label of the resource must dominate the security label of the user in order for the user to be granted access to the resource.

reverse map
To transform an Internet Protocol (IP) address to a host name as opposed to forward-mapping, where host names are transformed into IP addresses.

reverse mapping domain
A domain that transforms Internet Protocol (IP) addresses to host names.

reverse proxy
An IP-forwarding topology where the proxy is on behalf of the back-end HTTP server. It is an application proxy for servers using HTTP.

reverse proxy server
An application that intercepts communications from clients and verifies that the data satisfies security requirements before passing it on to the Community Server.

reverse restore
A FlashCopy option that reverses a FlashCopy relationship by copying over modified tracks from the original target volume to the original source volume. The background copy process must complete before reverse restore can be performed.

reverse solidus

reverse traceability
The ability to identify which assets were calibrated by particular measuring and test equipment.

reverse video
A form of highlighting a character, field, or cursor by reversing the color of the character, field, or cursor with its background. For example, changing a red character on a black background to a black character on a red background.

reversing journal
A journal that is used to copy company and group journals at year-end with alternative rules.


  1. To open a contract to check its language or other properties for purposes of collaboration or negotiation.
  2. A structured process for detecting and correcting faults and inconsistencies of elements.

review board member
One or more users that a community administrator specifies. The community administrator ultimately decides whether an asset is pushed into the approved state.

A person who reviews the submissions of reviewers or planners.

review file
In NPM, a VSAM key-sequenced data set (KSDS) that contains data that is collected and recorded as a result of a network start display command or start monitor command.

review process
The framework for approving, retiring, or deleting assets.

revisable-form text (RFT)
A data stream defined by document content architecture that is used to exchange unresolved documents (which cannot be directly printed or displayed) between systems. See also final-form text.

Revisable-Form-Text Document Content Architecture (RFTDCA)
The architectural specification for the information interchange of documents whose text is in a revisable format. A Revisable-Form Text Document Content Architecture document consists of structured fields, controls, and graphic characters that represent the format and meaning of the document.


  1. A distinct version of a TRIRIGA object that is automatically created and is identified by a sequential revision number. A revision is created on business objects, forms, and workflows when they are published. A revision is created for modules and reports when they are saved. A revision is created for UX metadata when a snapshot is taken.
  2. A distinct version of a project, document, or requirement identified by a unique internal revision number. See also version information.
  3. A version of an artifact that is designed to replace an earlier version, such as a model year of a car or a revised requirement. See also artifact, version.
  4. A clause or contract property that represents the net result of all edits and other updates by a single user before another user starts editing.

Revision Control System (RCS)
A system that manages multiple revisions of text files such as programs, form letters, and papers. RCS features automatic identification, storage, logging, retrieval, and merging of file revisions.

revision history
An audit trail of modifications and collaboration.

To remove a privilege or an authority from an authorization identifier.

revoke count
Number of unsuccessful sign-on attempts since the last successful sign-on with a particular userid.


  1. To move tape from the take-up hub to the supply hub.
  2. To select an earlier item, rather than the next or current item, from an argument list.


  1. In replication, an action that is taken when an SQL statement fails against a target table and the resulting SQL return code indicates that another SQL statement could be used to produce the expected result in the target table. An example is the conversion of an insert into a replication target table to an update if the insert fails because the row exists in the target table. Another example is the conversion of an update to a replication target table to an insert if the update fails because the row does not exist in the target table.
  2. To repair items that do not meet customer specifications due to damage or incorrect packing.

rewritable media
Media that can be erased, rewritten, or reused.

See route extension.

See Remote Execution Protocol.

See Restructured Extended Executor.

REXX interpreter
The language processor of the i5/OS licensed program that processes procedures and programs written in the REXX language.

See request for X.

See request for bid.


  1. See Request for Comments.
  2. See request for change.
  3. See remote function call.

RFC 959
A generally accepted standard for FTP implementation. RFC 959 defines commands that must be accepted by FTP servers and contains a general set of rules that FTP clients and servers must follow.

RFC type
The kind of change that a request for change (RFC) defines. Each RFC is required to have a type. Release management process owners can edit or remove the predefined RFC types and create new types.

See request for enhancement.

See request for information.

See radio frequency identification.

RFID tag
A tracking device that is used to record information about a product, animal, or person. For example, an RFID tag can be placed on a meat product at a farm, and then traced through the supply chain to the supermarket shelf. See also track and trace service.

See recency, frequency, monetary.

See Relational-Functional Markup Language.

R-formatted number
A number that has an explicit decimal point and truncates trailing zeros. For example, 2.01 is formatted as 2.01.

See request for proposal.

See request for quote.

RFQ response
When using the RFQ trading mechanism, the reply that a seller sends to a buyer who has sent them an RFQ. The RFQ response indicates the terms and conditions under which the Seller will sell the products or services to that buyer.


  1. See request for solution.
  2. See request for service.


  1. See revisable-form text.
  2. See radio frequency terminal.

See Revisable-Form-Text Document Content Architecture.

An electronic document that is created by a buyer and contains items for purchase and/or questionnaires related to a procurement activity. In Emptoris Sourcing it could also be a type of auction or a survey.

RFx summary
A report that contains information on the RFx attachments, items, and bid fields specific to each item, and item attachments. By printing or faxing this summary, information can be provided to offline suppliers to make bids on an RFx.

Pertaining to a color display that accepts signals representing red, green, and blue.

RGB color
A color value scale that is composed of the primary values (red, green, and blue).

RGB mode
A configuration of the hardware that allows values stored in the frame buffer to be interpreted as packed RGB values. The values found in the frame buffer are passed directly to the red, green, and blue guns of the display monitor. The values are not passed through the color map first. (However, each color is sent individually through the gamma ramp to make a final correction to its intensity.)

RGB value
The set of red, green, and blue qualities that compose a color.


  1. See request header.
  2. See request/response header.
  3. See response header.

See rich Internet application.

rich client
A client application that has full access to the functions of an operating system and performs most of the processing itself rather than depending on the server facilities. See also thin client.

rich hover
An in-context preview of the content that a link points to when the cursor hovers over the link.

rich Internet application (RIA)
A web application that provides desktop-like interfaces in the browser.

rich media
In a web page, content that is aural, visual, or interactive, such as audio or video files.

Rich Site Summary (RSS)
An XML-based format for syndicated web content that is based on the RSS 0.91 specification. The RSS XML file formats are used by Internet users to subscribe to websites that have provided RSS feeds. See also Atom, feed, RDF Site Summary, Really Simple Syndication.

rich text
A field that can contain objects, file attachments, or pictures as well as text with formatting options such as italics or boldface.

rich text editor
An embedded text editor that enables the creation of visually interesting blog posts, wiki articles, forum topics, and activity entries. Users can enter and format text as well as insert images and links.

rich text field
A field that can contain text, objects, file attachments, and pictures. Notes users can tell if they are in a rich-text field if the status bar at the bottom of the screen indicates the font size and font name being used.

Rich UI handler
An EGL construct that is used for creating a web application with EGL Rich UI. Its stereotype name is RUIhandler.

See resource identifier.


  1. See record identifier.
  2. See repository index data set.

RID list
A list of all of the RIDs that correspond to all of the rows that share a given index key. For example, if three rows share an index key, the RID list for that index key contains the RIDs for all three rows.

RID pool
See record identifier pool.

See Resource Interchange File Format.


  1. A security permission at the lowest, most granular level. Objects include the rights appropriate to them. For example, document classes include the create instance right, whereas folder classes include a file in folder right. Rights can be either allowed or denied.
  2. See privilege.
  3. A rule defined by an administrator that permits or restricts a user from specific actions such as viewing and editing data.

To control the positions of characters on a page so that the right margin of the printing is regular.

right-hand page
The page on the right when a book is opened. The right-hand page is usually odd-numbered.

right justify
To print text with an even right margin by adding extra space throughout a line.

right margin
The area between the rightmost text character and the right edge of the display or paper.

right outer join
A join whose result consists of the matched rows of the two tables that were joined and the unmatched rows of the second table. See also full outer join, join, left outer join, outer join.

The permission to perform a certain action on a specific resource.

right-to-left mode
An input mode (prevalent in “legacy” host systems) of a bidirectional machine in which the cursor moves to the left after each character is entered. In other systems (e.g., Windows and Unix), another input mode (the “push” mode) is used instead.


  1. In FDDI, two or more stations connected by a physical medium wherein information is passed sequentially between active stations, each station is turn examining or copying and repeating the information, finally returning it to the originating station.
  2. A method used to distribute data in a LAN.

ring buffer
An application-defined buffer in which monitor mode input is placed. An application places data from input devices in the buffer. The ring buffer mechanism dramatically shortens the input data path from the input device to the application.

ring error monitor (REM)
In communications, a function of the token-ring manager that observes, collects, and analyzes recoverable and irrecoverable error reports sent by token-ring stations on a single token-ring network and assists in fault isolation and correction.

ring network

  1. A network configuration in which devices are connected by unidirectional transmission links to form a closed path.
  2. A network in which every node has exactly two branches connected to it and in which there are exactly two paths between any two nodes.

ring server topology
A network configuration in which servers are connected one-to-one in a circle with the ends connected. It is similar to chain server topology, which connects servers one-to-one but with the ends unconnected.

ring station
The functions that are necessary for connecting to the local area network and for operating with the token-ring protocols. These include token handling, transferring copied frames from the ring to the using node's storage, maintaining error counters, observing Media Access Control (MAC) sublayer protocols (for address acquisition, error reporting, or other duties), and (in the full-function native mode) directing frames to the correct Data Link Control link station. A ring station is an instance of a MAC sublayer in a node attached to a ring.

See remote input/output.


  1. See Routing Information Protocol.
  2. See Router Information Protocol.

See remote IPL.

An action where the system waits for a member in a cluster to start before starting the next member of the cluster.

See recoverable indoubt structure.


  1. See reduced instruction-set computer.
  2. See reduced instruction set computer.


  1. An ongoing or upcoming concern that has a significant probability of adversely affecting the success of major milestones.
  2. A possible threat or potential damage that can be classified inside a company or organization. Risks are modeled by rules and constraints of business activities into a data model.

risk action
A work item that a project manager uses to either avoid a risk or minimize its effects on a project.

risk adjusted return on capital (RAROC)
A measure of the profitability of a bank customer relationship, adjusting for an ‘expected loss’, calculated from observed and predicted data.

risk analysis
An analysis of the security issues found in a web application. See also risk assessment.

risk assessment

  1. An evaluation of the benefits and consequences of an action or scenario. See also risk analysis.
  2. An evaluation of the supplier performance for the identification and management of procurement risks.

risk index
Statistical data used to measure the potential dangers in the procurement process after conducting a performance evaluation.

risk indicator
A measure of the potential exposure of a system to a security breach.

risk management
The optimal allocation of resources to arrive at a cost-effective investment in defensive measures within an organization.

risk model
A setup that can be used to determine how the system calculates and consolidates credit risk.

risk reassessment (RRA)

risk score

  1. The overall result of a risk assessment.
  2. A measure of how much risk an asset poses to a site, based on how critical the asset is and the amount and severity of attacks made against the asset.

risk taker
A risk-assuming entity or organizational unit that is part of a financial institution's own entities structure. This structure can be defined on both a legal entity (branches, subsidiaries, holding company) and business unit basis (examples are private wealth, corporate banking or trade finance).

risky protocol
A protocol that is associated with services that run on an open port in inbound communications from the internet to the DMZ.

river of news
News aggregation in which a program regularly scans a set of news sources and displays headlines in reverse-chronological order on a web page.

Rivest-Shamir-Adleman algorithm (RSA)
A public-key encryption technology developed by RSA Data Security, Inc, and used in the IBM implementation of SSL.

A connector that is used for modem connections.

See remote job entry.

See remote job processing.

RKM server
See remote key management server.

RLD count
The number of relocation dictionary (RLD) records in a load module that follow the text block that the count references. See also RLD record.

RLD record
A record in a relocation dictionary (RLD) that contains information on relocatable address constants for that program object or load module. See also RLD count.

See recovery log data set.

See run-length encoding.

See resource limit facility.

See received license plate number.

See record-level sharing.

See Release Link Trunk.

See report layout utility.


  1. See resource manager.
  2. See requirements management.
  3. See Resource Manager.

See Royal Mail 4 State Customer Code.


  1. See return merchandise authorization.
  2. See relationship management application.
  3. See return material authorization.

RMA authorization
An authorization that has been processed by a relationship management application (RMA).

RM affinity
When RM and a resource structure are used, an association between an IMS and a user or node with LOCAL status recovery mode. If RM indicates that the user or node has RM affinity to an IMS, the user or node cannot log or sign on to another IMS. This affinity occurs because end-user significant status (conversation, STSN, or Fast Path) is being recovered on an IMS.

See remote memory buffer.

See RMB element.

RMB element (RMBE)
The specific portion of an RMB that is associated with a specific TCP connection. Each RMB is partitioned into RMBEs.

See Resource Monitoring and Control.

See repository member data set.

RM distribution file
A file used to exchange relationship data with an relationship management application (RMA). It is the file that is created when you export bootstrap authorizations, and it is the file from which you import authorizations from an RMA.

See relationship management data store.


  1. See Resource Measurement Facility.
  2. See Resource Management Facility.


  1. See resource manager interface.
  2. See Remote Method Invocation.

See Remote Method Invocation over Internet InterORB Protocol.

RMI registry
A server program that allows remote clients to get a reference to a server bean.

RMI registry service
A Java virtual machine (JVM) service that stores the list of available services.

RMI server
A server that implements the Java Remote Method Invocation (RMI) distributed object model.

See resource manager local transaction.


  1. See reliable multicast messaging.
  2. See Removable Media Management.

RMM complex (RMMplex)
One or more instances of z/OS that share a common DFSMSrmm, or removable media manager (RMM), control data set (CDS).

See RMM complex.

See residency mode.

RM report
A report used to determine whether all the relationships that are required when using PV03 exclusively have already been recorded, and whether corresponding authorisations already exist.

See Requirements Management Rich Text Format.

See resource management utility.

See RDMA network interface card.


  1. See Rapid Network Reconnect.
  2. See receive not ready.

road category
A category that is used to define the types of road links that a user can include when adding a traffic layer.

To take a mobile device outside the service provider's coverage area and become a guest on a foreign network

Taking a mobile device outside the service provider's coverage area and becoming a guest on a foreign network.

robbed-bit signaling (RBS)
The T1 channel -associated signaling scheme that uses the least significant bit (bit 8) of each information channel byte for signaling every sixth frame. This is known as 7-5/6-bit coding rather than 8-bit coding. The signaling bit in each channel is associated only with the channel in which it is contained.

For media library devices, a part (carriage and picker assembly) for moving media between the cartridge storage slots and the drives.

robotic script
A recording of a typical customer transaction that collects performance data to determine whether a transaction is performing as expected, and exposes problem areas of the web and application environment.

Robots Exclusion Protocol
A protocol that allows website administrators to indicate to visiting robots which parts of their site should not be visited by the robot.

Pertaining to system that handles exceptional conditions, such as abnormalities in input, effectively.

See RDMA over Converged Ethernet.

rocker toggle
A switch that has two settings controlled by a lever or toggle that can be activated or deactivated by moving the lever from one side to the other.

See Resource Object Data Manager.

rogue metadata server
A metadata server that is not reachable from the cluster, fails to respond to requests, and might be running or have latent queued I/O.


  1. See return on investment.
  2. See region of interest.


  1. A classification of an identity that defines the focus, nature, or purpose for that identity. One or more roles can be associated with an identity. See also role code.
  2. A collection of access rights that can be assigned to a user, group of users, system, service, or application that enable it to carry out certain tasks.
  3. The function of an entity that participates in a relationship. Roles capture structure and constraint requirements on participating entities and their manner of participation. For example, in an employment relationship, the roles are employer and employee.
  4. A defined set of permissions that can be assigned to database objects such as fields, forms, and views to simplify their maintenance.
  5. A definition of the behavior and responsibilities of an individual or a team within the context of a software engineering organization.
  6. See relationship group.
  7. A position or responsibility within an organization, such as order entry clerk, marketing manager, travel advisor, sales associate, and so on. Activities are often assigned to roles rather than to individuals.
  8. A set of permissions or access rights. See also action.
  9. A job function that identifies the tasks that a user can perform and the resources to which a user has access. A user can be assigned one or more roles.
  10. A logical group of principals that provides a set of permissions. Access to operations is controlled by granting access to a role.
  11. A logical group of principals that provide a set of permissions. Access to resources is controlled by using provisioning policy to grant access to a role . A role can also represent a group of principals based on business job title or other business-related attributes. See also organizational role.
  12. A description of a function to be carried out by an individual or bulk resource, and the qualifications required to fulfill the function. In simulation and analysis, the term role is also used to refer to the qualified resources.
  13. The part played by an organization that is understood by all of the other organizations that are associated with that particular hub.
  14. A database entity that groups together one or more privileges and that can be assigned, for example, to users, PUBLIC, other roles, or trusted contexts.
  15. A set of job responsibilities related to a service management process. Each role is implemented as a security group, which gives users with that role access to a set of applications and a start center with role-appropriate information.
  16. The way in which a field is to be used in model building. Examples are input, target, both, or none (if the field is not used in building the model).
  17. A designation, such as attorney or records manager, that represents a set of permissions. Individual users are given roles to grant them access to particular objects and functions. For example, an attorney role is typically configured to grant full read/write/delete access to matters, notices, and interviews. Defining, naming, and assigning roles is the responsibility of the IT administrator.
  18. A job function that identifies the tasks that a user can perform and the resources to which a user has access. A user can be assigned one or more roles.

role alert
An alert that identifies a single entity or two entities that contain roles that the user defined as "of interest" or as "conflicting". See also alert, role alert rule.

role alert rule
A user-configured rule that identifies one or more roles, that, if present in a single entity, or if linked between multiple entities, would be considered "of interest" or as "conflicting". See also alert, role alert.

role-based access control (RBAC)
The process of restricting integral components of a system based on user authentication, roles, and permissions.

role-based authorization
The use of authorization information to determine whether a caller has the necessary privilege to request a service.

role-based management (RBM)
The process of restricting integral components of a system based on user authentication, roles, and permissions.

role-based security
Security that provides access rights to certain files, business processes, web templates, and features, according to the permissions associated with the user account.

role code
The unique identifier for a role. See also role.

role in-basket
An in-basket that contains work items that are assigned to a role, but not to a specific person. A role in-basket provides access to work items that are assigned to a group of people who share the same role.

role mapping
The process of associating groups and principals recognized by the container to security roles specified in the deployment descriptor.

role pair
The association of two volume roles in a session that take part in a copy relationship. For example, in a Metro Mirror session, the role pair can be the association between host volumes at the primary site and host volumes at the secondary site (H1-H2).

role separation
A database server installation option that allows different users to perform different administrative tasks.

role type
An XML attribute that defines the access level of a role to a console resource. Role types can be User, Privileged User, or Editor (case sensitive).


  1. See backout.
  2. The process of restoring data that was changed by an application program or user.
  3. The process of restoring data that was changed by SQL statements to the state at its last commit point. All locks are freed.
  4. An operation in a transaction that reverses all the changes made during the unit of work. After the operation is complete, the unit of work is finished.

roll back

  1. To revert a software package to a previously installed version.
  2. To return to a previous stable condition.
  3. To restore data that is changed by an SQL statement to the state at its last commit point. See also backout, point of consistency, roll forward.
  4. To remove changes that were made to database files under commitment control since the last commitment boundary. See also commitment boundary, commitment control.

rollback required (RBR)
Pertaining to a logical unit of work (LUW) state in which a rollback vote was received for a prepare-for-commit request or that a failure has put the current transaction into a state where it must be rolled back.

rollback segment
A function that enables a user to undo DML (data manipulation language) transactions that were performed against a database.

roll forward
To update the data in a restored database or table space by applying changes recorded in the database log files. See also roll back.

rollforward operation
The process of updating the data in a restored database or table space by applying changes recorded in the database log files.

rollforward recovery
A process that is used to recover a database by applying transactions that were recorded in the database recovery log file. See also crash recovery, version recovery.

rolling bounded period
A weekly or monthly period of time that does not necessarily start on the first day of the week or first day of the month.

rolling log
A dynamic, sequential set of files that contains a continuous stream of log data. A new file is added whenever a previous file exceeds some threshold (for example, the file surpasses a specified size, or a specified time interval passes). Sometimes, older files are pruned (automatically or manually) so that only a defined number of files is retained.

rolling migration
The process of stopping cluster services on one node at a time, upgrading the cluster software, and then reintegrating that node into the cluster before the next node is upgraded.

rolling update
A method of system upgrade across a clustered environment that ensures the continued operation of a multi-node installation, while only a single node is upgraded at a time.

rolling upgrade
In clustered systems, updating the system software on a cluster without interrupting service to the users of the cluster.

rolling window
A set duration of time that is always moving forward.

rolling window container
A container that stores time series data in multiple partitions, based on a specified time interval. When the maximum number of partitions is reached, older partitions are removed when new partitions are added.

rolling window table
A fragmented table of a restricted size from which fragments are purged when the insertion of new data would exceed a temporal or storage size limit.

The status of the oldest copy of a data set when a new backup, dump, or generation data set (GDS) copy is created. Roll-off specifies that the oldest copy is a candidate for deletion in order to maintain a customer-specified limit.

The efficient deletion of a large portion of a multidimensional clustering (MDC) table, which is possible when a DELETE statement is processed that either has no predicates or certain types of predicates (equality, range, BETWEEN, IN) on one or more dimension columns. See also deferred index cleanup rollout, immediate index cleanup rollout.

roll out
In Cloud/SaaS offerings, to release an activity to be completed by another user.

roll over
A function designed to define settings for questions that enable suppliers to provide multiple answers.

The transfer of monitored data to a data warehouse.

roll up
See consolidate.

rollup KPI
A KPI value that is calculated based on the status of its child KPIs.

rollup type
A measure in which the data can be calculated based on the formula or as a summation of leaf nodes.

See read-only memory.

The upright version of a face within a font family, as compared to the italic version. See also italic.

Roman font
In many typefaces, this ordinary type style is the default font, governing most text. It is often used to turn off italics or boldface.

The process of rendering any non-Roman text into the Roman alphabet. See also transliterate.

Roman numeral
Any of the characters I, V, X, L, C, D, and M having the value of 1, 5, 10, 50, 100, 500, and 1000, respectively. Lesser numbers in prefix position indicate subtraction. For example MCMLXIV is 1964 in decimal, because CM is 900, LX is 60, and IV is 4. See also Arabic numeral, Chinese numeral, Hindi numeral, number.


  1. A private space in which you can place content, folders, or additional rooms. Each room has a Members folder that defines who can enter the room and what they can do once inside.
  2. A program that allows users to create documents for others to read, respond to comments from others, and review project status and deadlines. Users can also chat with others who are in the same room.


  1. The UNIX definition for a directory that is the base for all other directories.
  2. See jailbreak.
  3. The directory that contains all other directories in a system.
  4. The user name for the system user with the most authority.
  5. In Enhanced X-Windows, the screen on which the window is created. The root of a pixmap or GContext is the same as the root of the drawable used when the pixmap or GContext was created. The root of a pixmap or graphics context is the same as the root of whatever drawable was used when the pixmap or graphics context was created. The root of a window is the root window under which the window was created.
  6. In a database outline, the topmost member in a branch.

root activity
The activity at the top of an activity tree, which has no parent activity.

root addressable area
In an HDAM or PHDAM database, the primary storage area in HDAM and PHDAM databases. IMS always attempts to put new and updated segments in the root addressable area, and if there is not enough room, IMS puts the segment into the overflow area instead. See also overflow area.

root anchor point (RAP)
In an HDAM or DE database, a pointer at the beginning of each physical block that points to a root segment that belongs in that block.

root authority
The end point in the signing path of a certificate.

root CA
See root certificate authority.

root certificate
The certificate (proof of identity and keys) of the original trusted signer or certificate authority that certifies the authenticity of the end user/entity (or of intermediate signers).

root certificate authority (root CA)
The certificate authority at the top of the hierarchy of authorities by which the identity of a certificate holder can be verified.

root class
A class that does not have a parent class. Most root classes can be subclassed or modified when configuring an object store. See also document class.

root component
The first or only level of a hierarchical item type, consisting of related system- and user-defined attributes.

root configuration file
In zIDE, a host-based project configuration file that defines the folder in which all other host-based project definition files are located.

root dbspace
The initial dbspace that the database server creates. The root dbspace contains reserved pages and internal tables that describe and track all other dbspaces, blobspaces, sbspaces, tblspaces, chunks, and databases. See also dbspace.

root device
The device on which the root file system resides.

root directory

  1. The directory that contains all other directories in the system.
  2. In the operating systems for personal computers, the directory on a disk or diskette that contains the list of files stored on that disk or diskette. If more than one directory is on a disk or diskette, the root directory is at the top of the hierarchy of directories. The root directory is created by the operating system when the disk or diskette is formatted.

root domain
Names servers that are authoritative for all of the top-level domains.

root element

  1. The implicit highest-level node of a parsed XML document. You may not always be able to predict which element will be the document element of a parsed instance, but it will always have a root node that you can count on being able to use for preliminary or setup processing.
  2. An element that represents the document/transaction that Sterling B2B Integrator is mapping. The root element defines the characteristics of the file, such as delimiters or record length. The root element is a group and can contain groups and records.
  3. An element used to define the namespace used by the XSL style sheet and the version of XSL being used in the document.

root entity
An entity in a grouped layout that has the highest degree centrality in its group. Depending on the data, there can be more than one root entity. See also degree.

root file system
The basic file system onto which all other file systems can be mounted. The root file system contains the operating system files that run the rest of the system.

root folder
The folder on the system that contains all other folders. The system-recognized identifier is *ROOT.

root installation
An installation performed by the root user.

root instance
A DB2 instance created by the root user from the DB2 product installed by that user.

Malicious software that enables a hacker to gain administrator-level access to a computer or computer network.

root load module
The load module that contains a main routine and that is the first to be executed in an application.

root node

  1. A single index page that contains node pointers to branch nodes. The database server allocates the root node when you create an index for an empty table. See also node.
  2. The common ancestor of all nodes in a set of nodes. There is only one root node for each XML instance document.
  3. In a graphical representation of data as a tree, a node that has no parents but typically has children.

root organization
The top level of an organization, which owns site-level access-control policies, and is automatically assigned all roles included in the product.

root page
The index page that is at the highest level (or the beginning point) in an index.

root privilege
A set of rights required to perform administrative tasks.

root requirement
A requirement at the top of the requirements hierarchy. A root requirement does not have a parent requirement.

root segment

  1. In a hierarchical database, the highest segment in the tree structure. It remains in main storage when other overlay segments are run. See also dependent segment.
  2. In AFP architecture, a segment in the picture chain that is not called by any other segment. If a single segment that is not in a chain is drawn, it is treated as a root segment for the duration of the drawing process. See also default drawing control.

root server
A name server that functions at the highest level node in the name system tree.

root squash
In the Network File System (NFS) Protocol, a reduction of the access rights for the remote superuser (root) when using identity authentication. The local user is the same as the remote user.

root squashing
In NFS implementations, the process where a server automatically maps the client user ID to another user ID.

root supertype
The named row data type at the top of a type hierarchy. A root supertype has no supertype above it.

root type
The type from which all other types stem. The root type represents the data objects of all the types in the tree.

root user

  1. A system user who operates without restrictions. A root user has the special rights and privileges needed to perform administrative tasks.
  2. In Linux and UNIX operating systems, a user who has superuser authority and root privileges. A root user's user identifier (UID) is 0.

root user authority
The unrestricted ability to access and modify any part of the operating system, usually associated with the user who manages the system.

See root volume group.

root volume group (rootvg)
A volume group containing the Base Operating System (BOS).

root window
In a graphics environment, the window that covers each screen. This window cannot be reconfigured or unmapped, but otherwise performs like any other window. A root window has no parent.

See reorder point.


  1. See records-enabled object store.
  2. See read-only storage.

A consortium of major computer and consumer electronics, electronic components, semiconductor manufacturing, telecommunications, and logistics companies that work together to create and implement industry-wide e-business process standards.

RosettaNet Business Message
The logical grouping of the preamble header, delivery header, service header, and payload (only for business action messages).

The group of people who attended a meeting or event.

Equipment that is tracked in inventory and can be repeatedly maintained, repaired, or restored to a working and serviceable condition.

rotary dial
On a switched communications line, the dialing method that creates a series of pulses to identify the called station.


  1. To change the dimensional orientation of a report or page display. See also pivot.
  2. To reorient an item by turning it on a touchscreen interface.

rotated font
A font whose graphic character representations are rotated 90 or 270 degrees to allow it to be printed at those orientations on a page.

rotated presentation
A category or subquestion list that is rotated, by one, for each respondent. For example, in a list of four categories, there would be four presentations: (1,2,3,4), (2,3,4,1), (3,4,1,2), (4,1,2,3).

rotating asset
A non-perishable asset that is tracked in inventory through its association with a specific rotating item.

rotating diagnostic log
A diagnostic log file that grows to a limited size, after which it is closed and a new diagnostic log file is created and opened for logging. To create the name of the new file, the index number used in the file name is incremented by 1.

rotating item
An inventory item for which each instance of the item is also tracked by its own asset number. Rotating items are typically repaired or refurbished, not discarded.

rotating tool
A tool for which each instance of the tool is also tracked by its own asset number.

In computer graphics, the transformation of a primitive by rotating it about an axis.

rotation array
A set of angle values that specifies the rotation of each page of the current document.

The rotating part of a sensor.

See region of uninterest.

Pertaining to an operation in which the database manager provides a continuous, even distribution of data within memory, across data partitions, or across storage containers.

round-robin fragmentation
A type of fragmentation that places rows one after another in fragments, rotating through the series of fragments to distribute the rows evenly.

round trip
A route that allows a shipper to obtain a discount for a carrier that travels from the origin to the destination and then back to the origin. See also continuous move.

round-trip conversion
A conversion where the integrity of all character data is maintained from the source CCSID to the target CCSID and back to the source. The characters that are in both the target CCSID and the source CCSID are preserved. Any characters outside the target CCSID are arbitrarily assigned unique code points in the target CCSID.

A process of converting data from one type to another and then back to the first type while preserving the format and content of the data.

round-trip response time
The time it takes to complete the entire page request. Round-trip time includes server time, client, network, and data transfer time.

round-trip time
The time it takes to complete an entire page request, which includes back-end service time, page render time, and network and data transfer time.


  1. The overall path between a defined list of stops.
  2. The sequential locations scheduled for a crew to complete work orders.
  3. A parallel processing stream in the final merging and ranking phases. Each route handles a different set of candidate answers.
  4. The URL used to direct requests to an application. A route is made up of an optional host (or subdomain) and a domain that are specified when an application is pushed. For example, in the route myapp.example.com, myapp is the host and example.com is the domain. A route can be associated with one or more applications. Unless a custom domain is specified, Bluemix uses a default shared domain in the route to your application. See also custom domain, domain, host, subdomain, Uniform Resource Locator.
  5. A path between two steps in a workflow definition.
  6. The path that network traffic follows from its source to its destination. See also cut-through.

route addition resistance (RAR)
A value that indicates the capacity of a network node to perform intermediate session routing.

routed order
An order that is assigned to a route itinerary template. A shipment leg is created for each leg in the route.

route extension (REX)
In SNA, the path control network components, including a peripheral link, that make up the portion of a path between a subarea node and a network addressable unit (NAU) in an adjacent peripheral node. See also explicit route, path, peripheral link, virtual route.

route ID
The identifier used for a sequence of stops for pickup visits or delivery visits or both. If a vehicle starts at a depot and returns to the same site, the route ID is increased by 1. If a vehicle starts somewhere that is not a depot, it does not return to the start site and so the route ID remains at 1. See also stop, visit.

route itinerary template
A process in which shippers set up common routes to simplify the process of building multileg shipments.

route list
A list that designates terminals or logical units, or particular operators, for which logical messages are to be scheduled for delivery.

route metrics
In Internet communications, the method used by the Routing Information Protocol (RIP) to choose the best Internet routes. The unit of measure is the number of hops between the origin and destination. In practice, the metric for a route is often assigned based on factors such as link transmission speed and line cost, not on the actual number of hops.

route plan
A plan for shipment that is set in place by the sponsor.


  1. A computer that determines the path of network traffic flow. The path selection is made from several paths based on information obtained from specific protocols, algorithms that attempt to identify the shortest or best path, and other criteria such as metrics or protocol-specific destination addresses.
  2. An attaching device that connects two LAN segments at the reference-model network layer. The LAN segments can use similar or different architectures. See also bridge.
  3. A part of the System i Access licensed programs that handle requests to send and receive data from applications on the personal computer and routes them to the appropriate applications on the system.
  4. A special purpose, dedicated computer that attaches two or more networks.
  5. An MVS program that presents a common systems interface for all products providing resource control. Resource managing components (such as CICS) call the MVS router as part of certain decision-making functions in their processing.
  6. In Sterling B2B Integrator, the Advanced File Transfer routing capability.
  7. A device or process that relays messages between multiple networks.

router exit
A point in the MVS router that can be modified to use a user-written or a vendor-supplied external security manager, instead of having the MVS router pass control to RACF.

Router Information Protocol (RIP)
The distance-vector routing protocol used by the Internetwork Packet Exchange (IPX) routers on the network to exchange routing information about the connected networks. The information is exchanged through the use of IPX. A RIP packet contains sets of network entry information.

Route Selection control vector (RSCV)
A control vector that describes a route within an APPN network. The RSCV consists of an ordered sequence of control vectors that identify the TGs and nodes that make up the path from an origin node to a destination node.

route selection services (RSS)
A subcomponent of the topology and routing services component that determines the preferred route between a specified pair of nodes for a given class of service.

route weight
A value computed for the set of transmission groups and intermediate nodes interconnecting an origin and destination node; route weight determines which route is preferred during the route selection process.


  1. A database object that can encapsulate procedural logic and SQL statements, is stored on a database server, and can be invoked using an SQL statement such as the CALL statement. The three main classes of routines are procedures, functions, and methods. See also aggregate function, built-in function, built-in procedure, external routine, function, method, procedure, row function, scalar function, sourced function, SQL function, SQL method, SQL procedure, SQL routine, table function, user-defined function, user-defined procedure.
  2. A program or sequence of instructions called by a program. Typically, a routine has a general purpose and is frequently used.
  3. A set of statements in a program that causes the system to perform an operation or a series of related operations.
  4. In REXX, a series of instructions called with the CALL instruction or as a function. A routine can be either internal or external to a user's program.

routine body
The implementation of the logic of a routine. See also function body, method body, procedure body, routine prototype.

routine modifier
A keyword in the WITH clause of a CREATE FUNCTION, CREATE PROCEDURE, ALTER FUNCTION, ALTER PROCEDURE, or ALTER ROUTINE statement that specifies a particular attribute or usage of a user-defined routine.

In COBOL, a user-defined word that identifies a procedure written in a language other than COBOL.

routine overloading
The process of assigning one name to multiple routines and specify parameters of different data types on which the routines can operate. See also routine resolution, routine signature.

routine prototype
The definition of a module routine without a routine body. A routine prototype can be referenced in an SQL statement; however, the referenced routine can be successfully invoked only after its routine body has been defined. See also module, routine body.

routine resolution
The process that the database server uses to determine which user-defined routine to execute, based on the routine signature. See also routine overloading.

routine signature
The information that the database server uses to uniquely identify a user-defined routine. See also parameter, routine overloading.


  1. The list of users who are to receive an item when it is distributed, including all users named specifically and those users named on distribution lists by the sender.
  2. The determination as to how to deliver a shipment. A result of the routing process is that a shipment is assigned to an existing load, or a new load is created for that shipment.
  3. The process of directing packets between networks.
  4. The assignment of the path by which a message is to reach its destination.
  5. A model for survey workflow, such as questions and logic, in the survey authoring tools.

routing channel
A channel configuration that matches incoming producer files with consumers, transforms the files according to the format specified in the consumer file structure, and sends them to the correct consumer.

routing channel template (RCT)
A template that defines the structure through which routing occurs. The RCT specifies producer and consumer mailbox structures and file structures. It mandates which partners can participate in various file transfer scenarios and which file formats they must use. An RCT is required to create a routing channel, which establishes the producer-consumer relationship for file transfers.

routing code

  1. A code assigned to an operator message and used to route the message to the appropriate console.
  2. For EMH, a user-defined code that allows transactions to be routed to programs within a load balancing group.

routing control
A control that determines which item is presented next based on the answers to previous questions in computer assisted interviewing methods, such as an IF/THEN/ELSE statement. See also off path, on path.

routing-control data set
In Download for OS/390, a data set containing routing statements that associate routing criteria of class, destination, and form name with the socket addresses of Infoprint Manager for AIX, Infoprint Manager for Windows NT/2000, or OnDemand servers.

routing data
Information stored in the job description that identifies the routing entry used by a job.

routing domain
In Internet communications, a group of intermediate systems that use a routing protocol so that the representation of the overall network is the same within each intermediate system. Routing domains are connected to each other by exterior links.

routing entry
An entry in a subsystem description that specifies the program to be called to control a routing step that runs in the subsystem.

routing guide
A list of conditions that determine how a shipment should be routed, and what carrier and service should be used. A routing guide has a time period for which it is effective, and conditions for when it should be applied.

routing guide line
A set of conditions the user configures so that routing methods for carrier selection, service used, and shipment mode are optimal for a particular kind of shipment.

Routing Information Protocol (RIP)

  1. In the Internet suite of protocols, a protocol used to exchange intradomain routing information and to determine optimum routes between internet hosts. This protocol determines optimum routes on the basis of route metrics, not link transmission speed.
  2. A variant of the XeroxNS Routing Information Protocol that is used to maintain current kernel routing table entries.

routing instruction
An instruction that informs interviewers or respondents which item in a paper questionnaire they should go to next.

routing list
The list that associates user names with network user addresses and other information, for the purpose of directing incoming X.25 calls.

routing loop
A situation that occurs when two or more mail forwarding mechanisms attempt to forward mail to each other. The mail travels back and forth over the network, creating a high volume of traffic that may seriously impact other network users.

routing path
In an MSC network, the route through which IMS passes a message from its origination through processing. One or more systems may be included in a routing path.

routing policy
A set of rules that determine how the server routes incoming requests.

routing protocol
A set of rules that routers use to manage router information.

routing region
In the dynamic routing of BTS processes and activities, the CICS region on which the distributed routing program runs. In BTS routing, the routing region is the same as the requesting region. See also requesting region, target region.

routing rule

  1. A condition that when its criteria are satisfied by event data, a collection of conditions and consequent routing are performed.
  2. A rule that enables Sterling B2B Integrator Mailbox to take automatic action when a message is added to a mailbox, such as notifying a business process to process the message.

routing step
The processing that results from running a program specified in a routing entry. Most jobs have only one routing step.

routing table

  1. In SNADS, a list of entries in a table that the system uses to route a message or electronic mail to a user on the system. Each entry is made up of a destination group name (such as a department or organization) and a destination element name (the user ID of each person in that department or organization).
  2. In a point-to-point profile, a collection of path information through which hosts or networks can communicate with other hosts and networks.
  3. A collection of routes that is used to direct datagram forwarding or to establish a connection. The information is passed among routers to identify network topology and destination feasibility.
  4. The table holding a list of valid paths through which hosts can communicate with other hosts. The routing table can hold static routes and dynamic routes.

routing transaction
A CICS transaction (CRTE) that enables an operator at a terminal owned by one CICS system to sign on to another CICS system connected by means of an IRC or APPC link.


  1. A horizontal arrangement of characters or other expressions.
  2. In AFP architecture, a subarray that consists of all elements that have an identical position within the high dimension of a regular two-dimensional array. See also column.
  3. The file-system definition for a directory that is the base for all other directories.
  4. The horizontal component of a table, consisting of a sequence of values, one for each column of the table. See also record.

row-begin column
A generated column that is defined with the AS ROW BEGIN clause. The value is assigned whenever a row is inserted into the table or any column in the row is updated. A row-begin column is intended for use as the first column of a SYSTEM_TIME period. See also generated column, row-end column, transaction-start-ID column.

row blocking
See blocking.

row-capture rule
In SQL replication, a rule that determines whether the Capture program captures changes for all columns or for registered columns only.

row change timestamp column
A generated column that is defined with the AS ROW CHANGE TIMESTAMP clause. A row change timestamp column provides a way for the database manager to automatically generate and maintain a timestamp value for each row that is inserted or updated in a table. A table can have no more than one row change timestamp column.

row data type
A complex data type that contains one or more related data fields, of any data type except IDSSECLABEL, that form a template for a record. The data in a row type can be stored in a row or column. See also complex data type, named row data type, unnamed row data type.

row-end column
A generated column that is defined with the AS ROW END clause. The value is assigned whenever a row is inserted into the table or any column in the row is updated. A row-end column is intended for use as the second column of a SYSTEM_TIME period. See also generated column, row-begin column, transaction-start-ID column.

row function
An SQL function that optionally accepts arguments and that returns a single row of values. A row function can be implemented in SQL and used as a transform function to map attributes of a structured type to built-in data type values in a row. See also function, routine.

A value that uniquely identifies a row in a table and does not change.

See row identifier.

row identifier (ROWID)
A value that uniquely identifies a row. This value is stored with the row and does not change. See also record identifier, table lock.

row limit
The maximum number of source data rows that a DataStream may process.

row lock
A lock on a single row of data. See also table lock.

row major order
A method of storing array elements such that the rightmost subscript varies most rapidly as memory-adjacent elements are accessed.

row-organized table
A table where the data pages contain row data instead of column data. See also column-organized table.

row-positioned access
The ability to retrieve a single row by using a single FETCH statement. See also rowset-positioned access.

row-positioned fetch orientation
The specification of the desired placement of the cursor as part of a FETCH statement, with respect to a single row (for example, NEXT, LAST, or ABSOLUTE n). See also rowset-positioned fetch orientation.

row-secure table
A database table with security labels on rows to filter out users without the appropriate privileges

A set of rows for which a cursor position is established.

rowset cursor
A cursor that is defined so that one or more rows can be returned as a rowset for a single FETCH statement and the cursor is positioned on the set of rows that is fetched.

rowset limit
An administrator-specified limit on the amount of rows that a user query can return.

rowset-positioned access
The ability to retrieve multiple rows by using a single FETCH statement. See also row-positioned access.

rowset-positioned fetch orientation
The specification of the desired placement of the cursor as part of a FETCH statement, with respect to a rowset (for example, NEXT ROWSET, LAST ROWSET, or ROWSET STARTING AT ABSOLUTE n). See also row-positioned fetch orientation.

row trigger
A trigger whose granularity is defined by using the FOR EACH ROW clause.

row variable

  1. A global variable, local variable, or parameter of a row data type.
  2. An IBM Informix ESQL/C host variable or SPL variable that holds an entire row type and provides access to the individual fields of the row.

Royal Mail 4 State Customer Code (RM4SCC)
A two-dimensional bar code symbology developed by the United Kingdom' Royal Mail postal service for use in automated mail-sorting processes.


  1. See Remote Procedure Call.
  2. See remote mode.

A service that implements versions 2, 3, and 4 of the portmapper protocol.

RPC control program
In DCE Remote Procedure Call (RPC), an interactive administrative facility for managing name service entries and endpoint maps for RPC applications.

RPC protocol
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a communication protocol that supports the semantics of the DCE RPC application programming interface (API) and runs over either connectionless or connection-oriented communication protocols.

RPC protocol sequence
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a valid combination of communication protocols represented by a character string. Each RPC protocol sequence typically includes three protocols: a network protocol, a transport protocol, and an RPC protocol that works with the network and transport protocols.

RPC runtime library
See Remote Procedure Call runtime library.

RPC thread
In the Distributed Computing Environment (DCE) Remote Procedure Call (RPC), a logical thread within which an RPC is run.


  1. See raster pattern generator.
  2. See Report Program Generator.

RPG Java method call
A piece of ILE RPG code that calls various Java methods, enabling the use of prewritten Java code along with RPG fields and variables.

See report interface.

See request parameter list.

RPL-based macroinstruction
In VTAM, a macroinstruction whose parameters are specified by the user in a request parameter list.


  1. See recovery point objective.
  2. See recruitment process outsourcing.

See recognized private operating agency.

See request for price quotation.

See raster pattern storage.

See request queue handler.


  1. See repeatable read.
  2. See resource record.
  3. See receive ready.

See resource recovery timeout value.

See risk reassessment.

See record resource block.

See relative record data set.

See reasonable resource loaded value.

See recoverable resource management services.

See relative record number.

See Resource Recovery Services.

See Resource Recovery Services attachment facility.

See RACF remote sharing facility.

RRSF logical node connection
A connection between two RRSF nodes that are properly configured to communicate through APPC/MVS.

RRSF network
Two or more RRSF nodes that have established RRSF logical node connections to each other.

RRSF node
See RACF remote sharing facility node.

See resource resolution table.

See read stability.

See EIA-232D.

An Electronic Industries Association standard for designing racks to hold data processing equipment.

See EIA-422A.

A family of workstations and servers based on IBM POWER architecture. They are primarily designed for running multiuser numerical computing applications that use the AIX operating system.


  1. See register save area.
  2. See Remote Supervisor Adapter.
  3. See Rivest-Shamir-Adleman algorithm.

RSA encryption
A system for public-key cryptography used for encryption and authentication. It was invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. The security of the system depends on the difficulty of factoring the product of two large prime numbers.

RS catalog repository
A reserved repository used to maintain the definitions of the user-defined IMS repositories that are managed by the RS, such as the IMSRSC repository. The RS catalog repository manages the association of repository names with repository data sets. See also IMSRSC repository.

RS catalog repository data sets
Two pairs of VSAM key-sequenced data sets (KSDSs) used by the Repository Server (RS) to maintain the definitions of the user-defined IMS repositories that are managed by the RS. RS catalog repository data sets consist of a primary pair and a secondary pair of repository index data sets (RIDs) and repository member data sets (RMDs). See also IMS repository function, IMSRSC repository.

See registered state change notification.

See Remote Spooling Communications Subsystem.

See Reliable Scalable Cluster Technology.

RSCT peer domain
See also management domain.

See Route Selection control vector.

See restart data set.


  1. See recoverable service element.
  2. See Remote System Explorer.

RSE name
The name that an installation gives to the two IMS subsystems that form a recoverable service element (RSE).

See resource set.

See remote shell.

See Remote Statistics Interface.

A command that breaks a TCP/IP connection between two appliances on a high availability network if one appliance stops sending information. The receiving appliance sends the command.

See real storage manager.

See resource sequence number.

See Remote Site Recovery.


  1. See Rich Site Summary.
  2. See route selection services.
  3. See Really Simple Syndication.

RS secondary server
See remote stand-alone secondary server.

See remote modem self-test.

See recommended service upgrade.

See ReSerVation Protocol.

See retweet.

See real-time analysis.

See remote terminal access method.


  1. See recovery termination manager.
  2. See response time monitor.

See recovery time objective.

See resource token.


  1. See Rapid Transport Protocol.
  2. See remote terminal processor.
  3. See Real-Time Transport Protocol.

RTP connection
See Rapid Transport Protocol connection.

RTP pipe
See Rapid Transport Protocol connection.

R-tree index
An indexing structure that supports spatial data. An R-tree index uses a bounding box, which is a set of coordinates that contains one or more objects and supports spatial data (two-dimensional, three-dimensional, and so on). An object can theoretically belong to more than one bounding box. An R-tree index is useful for searches on multidimensional data.


  1. See request to send.
  2. See reliable transfer server.

See Real-Time Streaming Protocol.


  1. See registered user.
  2. See response unit.
  3. See request/response unit.
  4. See request unit.

To define one endpoint of a line while the other endpoint is undefined. The undefined endpoint can be moved or stretched to any length and at any angle.

Pertaining to an object that can be derived from two endpoints, where one endpoint is defined and the other is undefined. For example, a circle is rubberbanded if the center is defined but the radius is not.

An object-oriented interpreted scripting language that borrows its straight forward syntactic style from Perl, Python, ADA, and Java.

ruby annotation
The assigning of ruby text to word formation elements.

ruby text
An explanatory line of text alongside a line of base text that is used in documents to indicate pronunciation or to provide annotation.

RU chain
In SNA, a set of related request or response units that are transmitted consecutively on a particular normal or expedited data flow. See also first-in-chain, last-in-chain, middle-in-chain, only-in-chain.


  1. A named definition of a run cycle that determines when an application will run.
  2. A set of conditional statements that enable computer systems to identify relationships and run automated responses accordingly.
  3. The smallest building block in a software analysis configuration.
  4. A configurable definition or limitation on how an order management system will behave when computing pricing and promotion charges, managing inventory, scheduling orders, and performing other related tasks.
  5. A condition that must be satisfied when a business activity is being performed.
  6. A list of conditions and actions that are triggered when certain conditions are met. Conditions include attributes about an object (file name, type or extension, dates, owner, and groups), the requesting client, and the container name associated with the object. See also action, alert, file-placement rule.
  7. A solid or patterned line of any weight (line width) that extends horizontally across a row or page, or vertically down a column or page.
  8. A set of commands and tools used to create specific calculations and optimizations within cubes.
  9. A requirement that can be built with AQL constructs.
  10. A statement that defines or constrains some aspect of the business. See also business rule, event rule.
  11. A condition that must be satisfied by the solution of a problem. A rule defines the context in which the problem is solved. See also requirement.
  12. A criteria that associates one trigger with one action, with every firing of the trigger causing the corresponding action to be invoked with the trigger event as input.

Rule 11
A payment method in which a different rail carrier takes each leg of a shipment. Each carrier submits a separate invoice to the shipper.

rule agent
An agent that includes a set of rules that are written in a business rule language and that are applied to incoming events. See also agent, business rule language.

rule analysis
A mechanism for checking whether business rules are semantically consistent. Inconsistencies can be found either in the rule itself, or with respect to other rules.

A deployment and management unit for Rule Execution Server that can contain one or more rulesets.

RuleApp archive
An archive that allows RuleApps to be stored to a file system. RuleApp archives are saved in a strict directory structure.

RuleApp project
An Eclipse project that performs the deployment of a RuleApp to a running Rule Execution Server.

rule artifact
An item used to express a business policy in a business rule application. Action rules and decision tables are examples of rule artifacts.

rule-based break iterator (RBBI)
A construct that identifies token boundaries (or breaks) in text that is based on regular expressions and defined in terms of Unicode characters and character properties.

rule-based category
Categories that are created by rules that specify which documents are associated with which categories. For example, you can define rules to associate documents that contain or exclude certain words, or that match a Uniform Resource Identifier (URI) pattern, with specific categories.

rule-based policy
A data privacy policy that masks source data with data that is generated by a programmatic rule.

rule-based run cycle
A run cycle that uses rules based on lists of ordinal numbers, types of days, and common calendar intervals. For example, the last Thursday of every month. Rule-based run cycles are based on conventional periods, such as calendar months, weeks of the year, and days of the week. See also offset-based run cycle, run cycle.

rule category
A set of rule templates that can be grouped together in the same folder.

Rule Designer
A business rule application development tool integrated into the Eclipse development environment and dedicated to the creation and management of business rule applications.

A document containing business rules and rule metadata that can be edited.

rule editor
A graphical tool used to create rules.

rule engine
A software component that evaluates and executes business rules. See also decision engine.

Rule Execution Server
A module that integrates into the Java EE environment, and as such offers the standard services of an application to execute, control, and monitor rulesets contained in RuleApps.

Rule Execution Server configuration project
A project in which a server configuration persists. The configuration provides the information necessary to make a connection to the rule execution server when a RuleApp is applied.

Rule Execution Server console
A web user interface that provides support for deploying RuleApps and the management of executable resources on Rule Execution Server.

rule execution set
A collection of rules that are intended to be executed together.

rule flow
A method of controlling and ordering the execution of rule artifacts. A rule flow is defined in terms of tasks.

rule induction
The process of automatically deriving decision-making rules from example cases. See also C5.0.

rule instance
An occurrence of a rule that includes the combination of objects in the working memory that match the patterns specified in the rule. More than one instance of the same rule may exist in the agenda at any time because the rule patterns may be satisfied by more than one object or set of objects.

rule logic
The business logic, which is expressed by a business rule, that consists of decisions that affect how a business responds to specific business conditions. For example, a decision that determines how much of a discount to give to a preferred customer is rule logic.

rule model
A model that defines the set of items that are managed in a rule and event projects, and their associated properties.

rule package
A container for organizing rule artifacts according to business logic. Rule packages become folders after they have been published to Decision Center.

rule perspective
An Eclipse perspective that defines the initial set and layout of views in the workbench window that will be used in the development of a rule project.

rule project
A project in which business rules and business object models are managed and organized.

rule project template
A pattern that defines the folder structure and options for a new rule project.

A line annotation that displays a calculated length based on the image properties.

Rules Automation Manager
A module that provides a way to configure rules that trigger defined actions and results.

rules-based personalization
Personalization technology that enables you to customize web content based on user needs and preferences, and business requirements.

rule schedule
An interface for modifying the values of a business rule in the rule logic selection record.

rule session
A runtime connection between a client and a rule engine. A rule session may consume initialized rule engine resources.

See rule set.

A decision-making program that can be processed by a rule engine to yield a decision, based on input and output parameters. The decision-making logic is implemented as rules, decision tables, and ruleflows. See also decision table.

rule set

  1. A set of rules that attempts to make predictions for individual records. Rule sets are derived from decision trees and represent a simplified version of the information found in the decision tree. See also decision tree algorithm.
  2. A selection of target products and a corresponding set of rules. Rules in a rule set are applied only to the targets that are defined in the rule set.
  3. An if-then statement that is composed of a set of textual statements, or rules, that are evaluated sequentially. If is the condition and then is the action. Each condition that evaluates to true is acted upon. See also action rule, if-then rule.

ruleset extractor
A mechanism for selecting the rules of the ruleset to be deployed. Selection is typically based on the value of rule properties.

ruleset interceptor
A mechanism that allows services to be added to an execution component transparently and to be triggered automatically when certain events occur.

ruleset parameter
A parameter that can be defined to set and retrieve values on a ruleset. Ruleset parameters are accessible from outside of the ruleset, and therefore are a bridge between the business logic and the application.

ruleset signature
The list of in, out, and inout parameters of a ruleset.

ruleset variable
A variable that can be defined to be used in all the rule artifacts of a ruleset.

rules file
A file that contains rules and definitions that pertain to those rules.

rules table
A control file containing one or more rules that the dead-letter queue handler applies to messages on the dead letter queue (DLQ).

rules tracer
A utility used to develop and debug rules.

rule task
In a rule flow, a task that refers to rule artifacts and orders them.

rule template

  1. A partly completed business rule that can be used to create a series of rules with the same structure.
  2. A criterion or set of criteria on which individual rules can be specified.


  1. To cause a program, utility, or other machine function to be performed.
  2. A performance of one or more jobs or programs.
  3. A string of repeated, adjacent characters or symbols. See also run-length encoding.

RunAs role
A role used by a servlet or an enterprise bean component to invoke and delegate a role to another enterprise bean.

runaway task
A task that has been dispatched and does not return control to CICS within a user-specified time interval. The program being used by this task is in a loop between two CICS requests. The task control program ends the task after expiration of this time interval.


  1. A compilation of procedures and operations that a system administrator or operator uses as a reference for running and maintaining a computer system or network.
  2. See configuration definition document.

run configuration
A method of handling model, data, and settings files within a project. A run configuration is a variation of a given project for execution and testing purposes. It combines a model file and one or more data files that differ, regarding contents and/or settings, from the original model and data of the project, while addressing the same mathematical problem.

run cycle

  1. A schedule that specifies when a job stream runs. See also calendar, exclusive run cycle, inclusive run cycle, offset-based run cycle, rule-based run cycle, simple run cycle, weekly run cycle.
  2. See trigger.

rundown procedure
In DCE Remote Procedure Call (RPC), a procedure used with a context handle that is called after a communications failure. It recovers resources reserved by a server for servicing requests by a particular client.

run environment
An environment where a database definition file collects alias definitions that the user can select, using a variable or command-line parameter.

run history
See execution log.

The raster (R) density of a font. This value defines the resolution (raster density) at which the raster patterns have been produced.

run-length encoding (RLE)

  1. A technique for compressing data that avoids repeatedly having to code data elements of the same value; instead, the value is coded once, along with the number of times for it to be repeated.
  2. A type of compression that is based on strings of repeated, adjacent characters or symbols, which are called "runs." See also run.

run map
An executable map that is called using the RUN function.

runnable interface
A Java interface that provides a common protocol to allow objects to execute code while they are active.

running foot
See footer.

running footing
See footer.

running head
See running header.

running header
A column heading that is repeated on following pages if the column continues on more than one page. See also header.

running state
The condition of a machine when users can login and use the machine.

Run On Server
A feature of WebSphere Studio, which enables the developer to test or preview a project using the embedded WebSphere Application Server.

run quantity
A number that indicates how many items to batch together the actual request for product and the available inventory to determine how many items must have the compliance service applied.


  1. Pertaining to the time period during which a computer program is running.
  2. The set of resources used to run the application. See also starter.

run time
The time period during which a computer program is running. See also system time.

runtime array
In RPG, an array that is loaded or created by input or calculation specifications after the program starts to run. See also compile-time array, preruntime array.

runtime-based enablement
A type of license enablement for a product with nodelocked licenses.

runtime communication exit library
A dynamically loaded, shared library that has access to the information and runtime environment that are used to process SQL and non-SQL API requests and the output of these requests.

runtime default
In query management, any of the formatting elements of a formatted report that was not explicitly specified in the form.

runtime descriptor definition
The runtime template (in an internal format of control blocks) that can be used as a model when creating runtime resource definitions.

runtime environment

  1. An environment that connects to a touchpoint and performs interactions. The runtime environment can consist of one or many runtime servers that are connected to a touchpoint. The runtime environment uses the information that is deployed from the design environment in combination with the Interact API to present offers to the touchpoint.
  2. A set of resources that are used to run a program or process.
  3. The environment where the project files are deployed to the server and then downloaded to the app.

Runtime Environment for Java
See IBM Runtime Environment for Java.

runtime error
An error that occurs during program execution.

runtime library

  1. A library that is loaded dynamically and used during execution time.
  2. A compiled collection of functions whose members can be referred to by an application program at run time.

runtime migration
The migration of a runtime environment, such as a stand-alone environment, or a network deployment environment, from one product or product version to another.

runtime pluggable localization pack
A pluggable localization pack that can be used without requiring a program restart.

runtime resource definition
The resource information such as attributes, status, and relationships to other resources that IMS maintains at run time in an internal format called control blocks. The runtime resource definitions include, but are not limited to, database directories (DDIRs), program directories (PDIRs), data management blocks (DMBs), program specification blocks (PSBs), Fast Path routing codes (RCTEs), and scheduler message blocks (SMBs) or transactions.

runtime rule selection
In a rule task, a way to filter rule artifacts at run time. Runtime rule selection is expressed in rule statements.

runtime session
A session that exists on the runtime server for each visitor to a touchpoint. This session holds all the data for the visitor that the runtime environment uses to assign visitors to segments and recommend offers.

runtime table
In RPG, a table that is loaded or created by input or calculation specifications after the program starts to run. See also compile-time table, preruntime table.

runtime task
A generated administrative action plan that contains recommendations to improve the health and performance of a runtime environment.

runtime topology
A depiction of the momentary state of the environment.

runtime variable
A variable in a procedure or query whose value is specified by the user when the procedure or query is run. The value of a runtime variable is only available in the current procedure or query. See also global variable.

run unit

  1. In COBOL, a set of one or more programs that run as a set to solve a problem. A set starts with the first COBOL program in the call stack and includes all programs (COBOL) (non-COBOL) that are below it in the call stack.
  2. One or more object programs that are executed together.

See remote unit of work.

See Rational Unified Process.

An expression that cannot have a value assigned to it. The result of calling a function that does not return a reference. Rvalues always have complete types or the void type. See also lvalue.

RVI character
See reverse-interrupt character.

See resource value unit.

The Electronic Industries Association (EIA) RS standards (for example, RS-232); the ITU/CCITT standards (for example, V.24 for modem interconnects and protocols); and the ITU/CCITT standards for interconnects and protocols (for example X.21). ITU is the International Telecommunications Union, and CCITT is the International Consulting Committee for Telephony and Telegraphy.

See responsive web design.

See Remote Execution and Access.

RXE Expansion Port
The dedicated high-speed port used to connect a remote I/O expansion unit, such as the RXE-100 Remote Expansion Enclosure, to a server.