This site contains terms and definitions from many IBM software and hardware products as well as general computing terms.
See universal port.
See universal access authority.
See user attribute data set.
See user acceptance testing.
See ubiquitous computing.
See unsigned binary number.
ubiquitous computing (ubicomp)
See pervasive computing.
See user block.
See unified buffer manager.
See user buffer pool.
See undercover agent.
See unit control block.
See User Centered Design.
See utility control facility.
See Unified Change Management.
- Universal Character Set, coded in 2 octets, which means that each character is represented by 16 bits. UCS-2 is a subset of UTF-16. See also UTF-16, UTF-8.
- A 2-byte (16-bit) encoding scheme based on ISO/IEC specification 10646-1. UCS-2 defines three levels of implementation: Level 1-No combining of encoded elements allowed; Level 2-Combining of encoded elements is allowed only for Thai, Indic, Hebrew, and Arabic; Level 3-Any combination of encoded elements are allowed.
See user-defined aggregate.
See user direct access programming library.
A set of web services that supports at least one of the Universal Description, Discovery, and Integration (UDDI) APIs. A UDDI node consists of one or more instances of a UDDI application running in an application server or a cluster of application servers with an instance of the UDDI database.
A statement of the required and expected behavior of a Universal Description, Discovery, and Integration (UDDI) registry that is specified through policy values that are defined in the UDDI specification.
A distributed registry of businesses and their service descriptions that adheres to the Universal Description, Discovery, and Integration (UDDI) standard for managing the discovery of web services. UDDI registries come in two forms, public and private, both of which are implemented in a common XML format.
See user-defined data stream.
See user-defined log.
An individual entry in a user-defined log (UDL) that stores custom content for categories in hierarchies or items in catalogs. See also user-defined log.
See User Datagram Protocol.
See user-defined routine.
See user-defined statistics.
See user dynamic storage area.
See user-entered forecast.
See Unified Extensible Firmware Interface.
See user entry procedure.
See UNIX file system.
See user interface.
See user interface block.
See user identification number.
A locale that governs all of the user interface of a particular program. See also data locale.
See user interface manager.
See UIMA Asynchronous Scaleout.
UIMA Asynchronous Scaleout (UIMA AS)
An architecture that provides for scaling out annotators by creating multiple instances for each annotator class. Each instance runs in its own thread. It is also possible in UIMA AS to spread the processing elements out across servers, which then communicate between each other using "messages" – through the use of a message queuing middleware like Apache ActiveMQ. In the case of UIMA AS, the messages are individual CASes.
See Unstructured Information Management Architecture framework.
See UIMA software development kit.
UIMA software development kit (UIMA SDK)
A software development kit that includes an all-Java implementation of the UIMA framework for the implementation, description, composition, and deployment of UIMA components and applications.
In the reference model for the integrated services digital network (ISDN), the interface that includes the transmission line between the network terminator 1 (NT1) and the line transmission termination (LT).
See user information source.
See usage license charge.
See upper-layer timeout value.
Ultimedia Business Conferencing
An IBM licensed program that provides a solution for desktop business conferencing. Ultimedia Business Conferencing is a cooperative processing application that manages the conference from scheduling to completion.
See user multiple entries.
See Universal Message Format.
The collection of Universal Message Format (UMF) segments that structure the data. See also UMF file.
A file that contains one or more Universal Message Format (UMF) documents. See also UMF document.
See UMF document.
UMF record segment
See UMF segment.
The part of a Universal Message Format (UMF) document that structures the data for the data source. See also DQM rule.
See Unified Modeling Language.
UML logical architecture
An architecture that is an interpretation of what that architecture should look like and is independent of the overall technology to be implemented. It is intended to be an abstraction of it.
See unique message reference.
See user-maintained data table.
In communications, a data transfer service that does not provide for an acknowledgment from data receiver to data sender that the data was received. An active data link connection does not need to be established between receiver and sender before sending the data. See also acknowledged service.
- In COBOL, a plus sign (+) or a minus sign (-) that precedes a variable or a left parenthesis in an arithmetic expression, which has the effect of multiplying the expression by +1 or -1, respectively.
- A group of mathematical indicators (+,-,*,/) that define how roll-ups are executed in a database outline.
- An operator that represents an operation on one operand. See also binary operator.
Work that does not require completion by a specific participant but can instead be completed by any one of a number of users or by an automated program. At run time, unassigned work is routed to a specified work queue; a user or program with access to that work queue can open and complete the work contained within.
An installation that does not require any user interaction. See also silent installation.
In Operations Console, a state of the system when the local controlling system can automatically grant access to a remote request for control of the System i system as long as the local controlling system does not have control at the time of the request.
unattended mode IPL
An IPL mode that automatically loads the operating system without any user interaction. See also attended mode IPL.
An operation not requiring a human operator to be at the device. See also attended operation.
Operating system installation on a target, using original installation files and parameters contained in a script defined on the OS deployment server. See also clone.
To remove the last template that was augmented to a profile. A profile must be unaugmented before it is deleted. See also augment.
See unbind session.
In SNA, a command used to reset the protocols for a session. See also BIND command.
In POSIX, a condition that allows a signal-handling action associated with a signal to be performed. See also blocked signal.
- Pertaining to a variable for which one or both of its bounds is infinite.
- Pertaining to a model for which the objective function can be optimized without limit.
A font designed to use unbounded character boxes. See also bounded-box font.
An organization of character graphics and information used by AFP programs for printers such as the IBM 3800 Printing Subsystem Model 3. Character boxes containing each character graphic do require some character positioning information in the form of white space in the character boxes. In addition, a separate character set is required for each combination of character rotation and text orientation. Fonts in unbounded-box format usually require more storage than fonts in bounded-box format. See also bounded-box format.
unbounded character box
A character box that can have blank space on any sides of the character shape. See also bounded character box.
A loop in which the maximum number of times that the loop can be iterated is unknown. This means that there is no upper limit to the number of times the questions in the loop can be asked. An unbounded loop cannot be defined as an expanded loop, and therefore grid tables cannot be created from an unbounded loop.
unbuffered disk I/O
Disk I/O that is controlled directly by the database server instead of the operating system. This direct control helps improve performance and reliability for updates to data. Unbuffered I/O is supported by character-special files on UNIX and by both unbuffered files and the raw disk interface on Windows. See also buffered disk I/O.
See Universal Naming Convention.
A logical partition that uses a shared processor pool whose assigned current processing capacity might be exceeded when the shared processor pool has any unused processing power. The value assigned to the uncapped partition determines the percentage of unused processing power that a logical partition receives when more than one uncapped partition is contending for the processing power in the shared processor pool.
A number in the range of 0 through 255 that can be set for each logical partition in the shared processor pool. Based on these values, any available unused capacity is distributed to contending logical partitions in proportion to the normalized values of their uncapped weight.
uncommitted read (UR)
An isolation level under which a query in a transaction can read any rows, even if there are uncommitted changes to those rows made by statements in other transactions. The UR isolation level is upgraded to CS when data is being modified. See also committed read, cursor stability, isolation level, read stability, repeatable read.
A breakpoint where processing is suspended during every run. See also conditional breakpoint.
- To take a device from the available (configured) state to the defined state by running the unconfigure method for a device. This action is reflected in the device status field of the Customized Devices Object Class.
- To take out of use by the current computer system.
An instance of an installed software product that has not been explicitly assigned to any license. See also software product.
In OSI, a service that does not indicate to the sender whether or not data or control information was properly received. An unconfirmed service involves only request and indication service primitives. See also confirmed service.
A flow that proceeds without dependencies or conditional expressions. Typically, an uncontrolled flow is a sequence flow between two activities that do not have a conditional indicator (mini-diamond) or an intervening gateway.
The process of putting a solution back in terms of the original formulation of a problem so that a customer can recognize it. See also crush.
- To take a device instance out of the system by running the undefine method for the device. This action purges all of the device information that is in the Customized Database.
- To cause a command to no longer recognized by the current computer system.
Referring to a program or function that might produce erroneous results without warning because of its use of an indeterminate value, or because of erroneous program constructs or erroneous data. See also implementation-defined.
undelivered message queue
See dead-letter queue.
To remove files or uninstall software from an operational environment. For example, in a policy-enabled system, policies are undeployed from the autonomic managers, making them no longer available for use in that operational environment. See also deploy.
undercover agent (UCA)
An agent that is attached to a message event in a business process definition (BPD) and that calls a service to handle the event. For example, when a message event is received from an external system, a UCA is needed to invoke the appropriate service in response to the message.
The representation of lower-layer connectivity that is used by higher-layer connectivity. For example, the physical connection that transports data between two IP hosts is an underlying connection.
In architecture, a mixing rule in which the intersection of part of a new presentation space Pnew with part of an existing presentation space Pexisting keeps the color attribute of Pexisting. See also blend, overpaint.
- To run out of audio data to play, resulting in voice or music being audibly broken up or cut off.
- Loss of data caused by the inability of a transmitting device or channel to provide data to the communications control logic at a rate that is fast enough for the attached data link or loop.
A situation in which shared file system is not scanned at all, or some of its parts are not scanned. See also overscanning.
- To place a line under one or more characters; to underline.
- A line printed under a character or along the lower edge of the space normally occupied by a character.
A character used in each position of an entry field to indicate its length. This indicator of entry field length is used on display devices that do not have the underscore attribute.
- A state of a unit of recovery that indicates that the changes that the unit of recovery made to recoverable DB2 resources must be backed out.
- In a data entry database, a state that occurs when no changes have been committed in the database. The changes are still in main storage and are backed out from there.
- To recover the last edit that has taken place.
A log record used in recovery. The redo part of the record describes a change to be made to an IBM MQ object. The undo part describes how to back out the change if the work is not committed.
To make an address space unknown to MVS. See also dub.
See one-source matching.
To unsubscribe from someone's profile in order to block their activities from one's profile. See also follow.
- Pertaining to something that is not defined, organized, or arranged in a required manner. See also field-formatted.
- In VTAM, pertaining to commands (such as LOGON or LOGOFF) entered by a user and sent by a logical unit in character form. The character-coded command must be in the syntax defined in the user's unformatted system services definition table. See also converted command, field-formatted.
unformatted event table
A table that is used to store event monitor data in its original binary format, not in a readable format. See also event monitor.
A file that is arranged without such characteristics as a certain number of characters and lines per page, line spacing, and headings. See also formatted file.
unformatted print records
Traditional line data made up of fields of data that have not been formatted into print lines. PSF uses a page definition to format these records for printing on page printers.
unformatted system service (USS)
A communications function that translates a character-coded command, such as a LOGON or LOGOFF command, into a field-formatted command for processing by formatted system services. See also field-formatted, formatted system service.
To sever a relationship with someone on a social networking site See also friend.
A condition that is not handled by any condition handler for any stack frame in the call chain. See also handled condition.
See user-to-network interface.
A character encoding standard that supports the interchange, processing, and display of text that is written in the common languages around the world, plus many classical and historical texts. See also multibyte character set.
See universal ID.
A user of the i5/OS licensed program who uses the services of i5/OS but who is not automatically reported on by the license management function of i5/OS. An example of an unidentified user is one who accesses a System i system through a gateway server that is not a System i system.
A printing method in which the print head on the printer prints only while it moves in one direction, instead of also printing while it moves in the opposite direction. This method of printing usually produces higher-quality print output.
In Q replication, a configuration in which changes that occur in a source table are replicated over WebSphere MQ queues to a target table or are passed to a procedure to manipulate the data. Changes that occur in a target table are not replicated back to a source table.
Unification Precirion Affini (UNIPREA)
The former name of the UNIficazione Information Technology (UNINFO). See also UNIficazione Information Technology.
UNIficazione Information Technology (UNINFO)
The Italian national standards body that develops national standards and co-operates in defining international standards for information technology. See also Unification Precirion Affini.
Unified Extensible Firmware Interface (UEFI)
A specification that details the interface between the operating system and the platform firmware at boot time. It is not specific to any processor architecture.
A messaging system in which a single copy of a message is stored and accessed by multiple applications (for example, voice mail and email). See also integrated messaging.
Unified Resource Manager (URM)
Licensed internal code (LIC), also known as firmware, that is part of the Hardware Management Console. The Unified Resource Manager provides energy monitoring and management, goal-oriented policy management, increased security, virtual networking, and data management for the physical and logical resources of a given ensemble.
A uniform classification system that is used to organize preliminary construction information into a standard order or sequence on the basis of function elements. See also function element.
uniform baseline offset
The distance from the top left corner of a character box to the picture element (pel) position that appears to rest on the baseline. This value, which is coded in the FNO structured field, is the same for all the characters in a font.
uniformly spaced font
A font in which the character increment for each graphic character is the same. See also proportionally spaced font.
- A compact string of characters for identifying an abstract or physical resource.
- A unique address that is used to identify content on the web, such as a page of text, a video or sound clip, a still or animated image, or a program. The most common form of URI is the web page address, which is a particular form or subset of URI called a Uniform Resource Locator (URL). A URI typically describes how to access the resource, the computer that contains the resource, and the name of the resource (a file name) on the computer. See also Uniform Resource Name.
Uniform Resource Locator (URL)
The unique address of an information resource that is accessible in a network such as the Internet. The URL includes the abbreviated name of the protocol used to access the information resource and the information used by the protocol to locate the information resource. See also custom domain, domain, host, route, subdomain.
Uniform Resource Name (URN)
A name that uniquely identifies a web service to a client. See also Uniform Resource Identifier.
See UNIficazione Information Technology.
In SNA, a character string that a system services control point (SSCP) can convert into the network name of a logical unit (LU). Typically, an uninterpreted name is used in a logon or Initiate request from a secondary logical unit (SLU) to identify the primary logical unit (PLU) with which the session is requested. See also network name.
uninterruptible power supply (UPS)
A source of power from a battery installed between the commercial power and the system that keeps the system running, if a commercial power failure occurs, until it can complete an orderly end to system processing.
- An SQL operation that combines the results of two select statements. Unions are often used to merge lists of values that are obtained from several tables.
- A variable that can hold any one of several data types, one data type at a time.
See stacked set.
See Unification Precirion Affini.
- A processor complex that has one central processor.
- A system containing a single processor. The phrase "comparable uniprocessor" means a system designed to have only a single processor, with the same CPU-clock speed and cache capacity as the SMP system being discussed, running a uniprocessor version of the operating system.
- In Informix, a descriptor that is assigned to each column in a table, function argument, or function return type that indicates the type of data that can be held.
- The rule that no two values in a primary key or key of a unique index can be the same. See also constraint.
- A rule that specifies that the values of no two attributes should be the same.
A Virtual Storage Access Method (VSAM) file that occupies a data space of its own. The data space is defined at the same time as the file and cannot contain any other file. See also suballocated file.
unique identifier (UID)
An identifier that is assigned to storage-system logical units when they are created. It is used to identify the logical unit regardless of the logical unit number (LUN), the status of the logical unit, or whether alternate paths exist to the same device. Typically, a UID is used only once.
- A field or set of fields in a database file that must be unique, ascending, and cannot contain a null value. A unique key can become a parent key.
- A key that is constrained so that no two of its values are equal. See also constraint, foreign key, primary key.
unique message reference (UMR)
An optional feature of MERVA ESA that provides each message with a unique identifier the first time it is placed in a queue. It is composed of a MERVA ESA installation name, a sequence number, and a date and time stamp.
- A designation for a level that indicates that each category in that level can be identified by its source value alone, without reference to its ancestors. The user must specify that the data is unique when a level is the convergence level for multiple drill-down paths or when the model contains multiple data sources. For example, employee IDs are unique source values, employee names are not.
- In information analysis, a measure of the value occurring exactly once in the table data.
- A quantity that is used as a standard of measurement. For example, in XBRL, the unit km/s (kilometers per second) contains two measures: kilometers and seconds.
- The length of measurement: USA, metric or user-defined.
- A mechanical, electrical, or electronic piece of equipment for a special purpose.
- The defined space within disk units that is addressed by the system.
- In FORTRAN, a means of referring to a file to use input/output statements. A unit can be connected or not connected to a file. If connected, it refers to the file. The connection is symmetric; that is, if a unit is connected to a file, the file is connected to the unit.
- The identifier for a logical subsystem and the logical device within the subsystem.
- In mainframe computing, the address associated with a device on a given control unit. On ESCON or FICON interfaces, the unit address is the same as the device address. On OEMI interfaces, the unit address specifies a control unit and device pair on the interface.
- The address of a particular device, specified at the time a system is installed.
United Nations Electronic Data Interchange for Administration, Commerce and Transport (UN/EDIFACT)
See Electronic Data Interchange For Administration, Commerce and Transport.
See device name.
unit of compilation
In VS COBOL II, a section of source input from which the compiler produces a single object program. A unit of compilation can consist of a containing program and other programs nested within it.
- A recoverable sequence of operations within a single resource manager, such as an instance of DB2 for z/OS. See also unit of work, unprotected logical unit of work.
- A defined package of work to be performed by the Resource Recovery Services (RRS).
- A sequence of operations within a unit of work between sync points.
- In advanced program-to-program communications, the amount of processing that is started directly or indirectly by a program on the source system.
- A recoverable sequence of operations performed by an application between two points of consistency. A unit of work begins when a transaction starts or at a user-requested sync point. It ends either at a user-requested sync point or at the end of a transaction.
- A recoverable sequence of operations within an application process. At any time, an application process is a single UOW, but the life of an application process can involve many UOWs as a result of commit or rollback operations. In a multisite update operation, a single UOW can include several units of recovery. See also multisite update, remote unit of work, unit of recovery.
unit of work boundary
The point in time when a connection disassociates itself from its current transaction. The following events cause a unit of work boundary to be ended: a commit, a rollback, an XA end (success), an XA commit, or an XA rollback.
In advanced program-to-program communications, a unique label assigned to the unit of work. The ID is established when the program on the source system is started and is associated with each job started by that source system on the target system. The unit-of-work identifier provides a beginning-to-end audit trail within an APPC network.
- A group of numbers displayed on the console or control panel that identifies failing parts, system or device states, or system or device status conditions.
- The last 4 characters of the SRC.
See sales volume.
- A printer feature that permits the use of a variety of character arrays.
- The ISO standard that allows all data to be represented as 2 bytes (UCS-2) or 4 bytes (UCS-4). Encoding in the UCS-2 form can accommodate the necessary characters for most of the written languages in the world.
Universal Description, Discovery, and Integration (UDDI)
A set of standards-based specifications that enables companies and applications to quickly and easily find and use web services over the Internet. See also web service.
universal ID (UNID)
A unique 16-byte value that is assigned to a note when the note is first created. UNIDs are used when replicating database notes and when replacing or refreshing database design notes.
universal integration hub
A unified page presentation architecture that enables site designers to create web portal pages by using various components, including HTML and web content, feeds, portlets, iWidgets, and elements that are derived from frameworks such as Adobe Flex.
Universal Message Format (UMF)
An extensible XML dialect used for structuring data source files. UMF contains standard tags that represent key pieces of identities, relationships, and activities. Before data can be processed by the pipelines, it must be converted into UMF and follow the UMF specification.
universal port (U_port)
A switch port that can operate as a generic port (G_port), an expansion port (E_port), a fabric port (F_port), or a fabric loop port (FL_port). A port is defined as a U_port when it is not connected or has not yet assumed a specific function in the fabric.
Universal Unique Identifier
See Universally Unique Identifier.
A highly portable operating system that features multiprogramming in a multiuser environment. The UNIX operating system was originally developed for use on minicomputers, but was adapted for mainframes and microcomputers. The AIX operating system is IBM's implementation of the UNIX operating system.
UNIX System Services
An element of z/OS that creates a UNIX environment that conforms to XPG4 UNIX 1995 specifications and that provides two open-system interfaces on the z/OS operating system: an application programming interface (API) and an interactive shell interface.
- A group of commands, programs, and files that allows the user to communicate with another UNIX system over a dedicated line or a telephone line.
- The command (uucp) that starts file copying from one or more sources to a single destination.
- Pertaining to two or more different operating environments. For example, unlike distribution is distribution between DB2 for i5/OS and DB2 environments.
- In social networking, to withdraw support from something that has been posted. See also like.
Unlimited Strength Policy File
See Java Cryptography Extension.
In IDDU, to remove the association between a database file on disk and a file definition in a data dictionary. See also link.
Pertaining to a status where the optical image associated with the selected image catalog entry that is not active or not loaded in the active virtual optical device. Only image catalog entries with a status of mounted or loaded can be accessed through the virtual optical device.
A timestamped snapshot of RACF database contents. Unload files are used for multiple tasks, such as maintaining data backups, database content mergers, and database content comparisons for audits and troubleshooting.
- To release an object or system resource that was previously locked and return it to general availability.
- To allow an authorized user to remove the lock from a locked contract.
- To remove software that was placed on a device to limit the users access to facets of that device.
A device that is known to the cluster but not provisioned, monitored, or updated. Defining a device as unmanaged in the cluster prevents the IP address from being used by the provisioning engine.
- See unmanaged device.
- A node that is defined in the cell topology that does not have a node agent that manages the process. An unmanaged node is typically used to manage web servers.
unmanaged web application
A web application with a lifecycle that is managed outside of the administrative domain. By creating a representation of these applications that are deployed through external tools, the on demand router can prioritize and route HTTP requests to the application.
See basic conversation.
- To copy data from a remote procedure call packet by using a stub. See also marshal.
- To deconstruct an object so that it can be written as a stream of bytes.
unnamed row data type
A row data type created with the ROW constructor that has no defined name and no inheritance properties. Two unnamed row data types are equivalent if they have the same number of fields and if corresponding fields have the same data type, even if the fields have different names. See also row data type.
In binary floating-point, describing the relationship that exists between two values when they cannot be arranged according to relative value. The relationship between two values is unordered either when a not-a-number is compared to any value or when infinity is compared to any value other than infinity.
unpacked decimal format
See zoned decimal format.
An event sent by a object in the pend state that results in the moving of the object to the online state. See also pend.
unplanned remote takeover
In an RSR environment, a remote takeover initiated by the tracking IMS to transfer the workload from the active IMS to the tracking IMS at the remote site without waiting for an orderly shutdown of the active IMS. See also remote takeover.
A hardware protection state in which the processor can only run unprivileged instructions. The processor's unprivileged state supports the virtual machine's operating system state and problem state. See also privileged state.
An LU 6.2 conversation that has a synchronization level of none or confirm. If conversation errors or failures occur, the resources used by the application might be in inconsistent states.
unprotected logical unit of work
The logical unit of work that is used in an unprotected conversation. See also unit of recovery.
A volume that is recognized by the AS/400 host as an unprotected device, even though the storage resides on a Redundant Array of Independent Disks (RAID) and is therefore fault tolerant by definition. The data in an unprotected volume can be mirrored. An unprotected volume is also referred to as an unprotected device.
- To remove files from depot servers after they have been successfully distributed and installed on target computers.
- To remove content from a site on the web after it has been made available for some time.
unqualified segment search argument
A segment search argument that contains only a segment name that specifies the segment type to be accessed. See also segment search argument.
Pertains to a web diagram node that is not yet associated with an actual resource. See also realize.
- A printer error condition that cannot be automatically corrected and requires an external operation for possible correction. This error causes, for example, the end of a job, program, hardware function, page, or printing.
- An error for which recovery is impossible without use of recovery techniques external to the computer program or run.
See nonrecoverable transaction.
A model that contains information extracted from the data but which is not designed for generating predictions directly. See also Apriori.
See loop unrolling.
A request to run an activation of an activity which currently cannot be satisfied, either because the activity is not available or because the region on which the request must run is inaccessible.
unsigned security token
An authentication specification used to verify the recipient of the message containing the token. Unsigned tokens often consist of login credentials supplied by the service requestor, for example, a user name token.
Pertaining to the act of providing information or actions to a resource, without the resource having requested the information or action. See also solicited.
Unwelcome and bothersome email. See also ham.
CICS statistics automatically gathered by CICS for a dynamically allocated and deallocated resource (for example, an autoinstalled terminal) when the resource is about to be deleted. See also end-of-day statistics, interval statistics, requested reset statistics, requested statistics.
A notice process that uses prose to specify the documents that must be collected. The collection instructions take the form of collection notices which are sent to custodians for manual execution.
unstructured collection plan
A collection plan that uses prose to create collection instructions. These instructions take the form of collection notices, which are sent to custodians for manual execution.
Any data that is stored in an unstructured format rather than in fixed fields. Data in a word processing document is an example of unstructured data. See also structured data.
Unstructured Information Management Application
A software system that analyzes large volumes of unstructured information in the form of text, audio, video, or other media to discover, organize, and deliver relevant knowledge to the application user.
Unstructured Information Management Architecture framework (UIMA framework)
A Java-based implementation of the UIMA architecture. It provides a run-time environment in which developers can plug in and run their UIMA component implementations and with which they can build and deploy UIM applications.
A notice process that uses prose to specify the documents that must be preserved. The preservation instructions take the form of hold notices which are sent to custodians for manual execution.
Unstructured Supplementary Service Data (USSD)
A communication technology that is used by GSM cellular telephones to send text messages between a mobile phone and an application program in the network. USSD establishes a real-time session between the mobile phone and the application that handles the service.
In architecture, unmarked portion of a physical medium. See also toned.
untyped collection variable
A generic ESQL/C collection variable or SPL variable that can hold a collection of any collection data type and takes on the data type of the last collection assigned to it. See also typed collection variable.
A parameter marker or null value that is specified without a target data type. See also untyped parameter marker.
In cross-site mirroring, pertaining to the mirror copy data state that indicates that the mirror copy contains incoherent data. This occurs (a) during synchronization because synchronization does not preserve the order of writes and (b) if a failure occurs while performing geographic mirroring in asynchronous mode.
See unit of measure.
See unit of work.
See user printable area.
See universal product code.
The ability of a cursor to perform positioned updates and deletes. The updatability of a cursor can be influenced by the SELECT statement and the cursor sensitivity option that is specified on the DECLARE CURSOR statement.
- Software maintenance such as a manufacturing refresh, refresh pack, or fix pack that changes the modification level of a product.
- To modify a file or data set with current information.
- To apply fixes to a system.
An access intent that establishes the intent of an application to modify the database. Other applications may read the database if they do not need to be protected from the updater's incomplete changes.
In SQL replication, a type of replication in which all tables are both registered sources and read/write targets. One table is the primary source table for performing a full refresh of all of the others. See also master table, multitier replication, peer-to-peer replication, replica table.
See time-based update detection.
The location on which a cursor is positioned when a row in the result table is fetched again but values in the underlying tables have been updated such that the row no longer satisfies the search condition. See also delete hole, hole.
In IMS, DL/I, or SQL/DS, the type of access intent that allows a subsystem to insert, delete, or replace records on a database. See also scheduling intent.
- In Informix, a promotable lock that is acquired during a SELECT...FOR UPDATE. An update lock behaves like a shared lock until the update actually occurs, and it then becomes an exclusive lock. See also promotable lock.
- A lock that limits concurrently executing application processes to read-only operations on the data if these processes have not declared that they might update the row.
A shell script or executable file created by the developer of an application program to update the program. The script file must follow specific guidelines to be compatible with the program update tools that are provided in the operating system.
update time stamp (UTS)
In the DCE Cell Directory Service (CDS), an attribute that identifies the time at which the most recent change was made to any attribute of a particular CDS name. For directories, the UTS reflects changes made only to attributes that apply to the actual directory (not one of the replicas).
A trigger that is activated by an update operation on the table or view that is specified in the trigger definition. See also delete trigger, insert trigger, instead of trigger, read trigger, trigger.
A fold that points up from the horizontal surface when fanfold forms are unfolded and held horizontally. Fanfold forms are alternately folded with up and down folds. See also down fold.
- Any hardware or software change to a later release, or any hardware addition or software addition.
- To install a new version or release of a product to replace an earlier version or release of the same product.
- See update.
Pertaining to controllers that are above devices, and lines that are above controllers in a communications configuration. See also downline.
A limit that indicates the greatest value that a variable can assume. In operations research, an upper bound may or may not be in the domain of a variable. When an upper bound is in the domain of the variable, the variable may assume precisely that value, but no greater. When an upper bound is not in the domain of the variable, the variable may assume values strictly less than the upper bound, but not precisely the upper bound itself. See also bound, bound strengthening, least upper bound, lower bound.
- Pertaining to those graphic characters of a layer which can be input from a keyboard by using the normal shift key (IBM Corp. Std. C-S 2-0161-008).
- Pertaining to the capital alphabetic characters, as distinguished from the small alphabetic characters. The concept of case also applies to alphabets such as Cyrillic and Greek, but not to Arabic, Hebrew, Thai, Japanese, Chinese, Korean, and many other scripts. Examples of capital letters are A, B, and C. See also lowercase.
Property of a vertical typeface such as Roman. See also inclined posture.
See uninterruptible power supply.
- Pertaining to a direction that goes against the flow of a development process that moves from requirements to designs to implementation to tests. For example, requirements are upstream from tests. See also downstream.
- Pertaining to the direction of the flow, which is from the start of the process (upstream) toward the end of the process (downstream).
- Pertaining to the direction opposite to data flow, which is toward the source of a transmission. See also downstream.
- Pertaining to the direction from driver to stream head.
See mean time between failures.
The methods, processes and procedures that enable lower-level systems-management software, such as IBM Director Agent, to work with higher-level systems-management software, such as Tivoli Enterprise or Microsoft SMS.
upward integration module
Software that enables higher-level systems-management software, such as Tivoli Enterprise or Microsoft Systems Manager Server (SMS), to interpret and display data provided by IBM Director Agent. This module also can provide enhancements that start IBM Director Agent from within the higher-level systems-management console, as well as collect IBM Director inventory data and view IBM Director alerts.
urban heat island
A metropolitan area that is significantly warmer than the rural areas around it, due to the use of concrete in buildings and road surfaces, waste heat from vehicles, and air pollution.
See unit reference code.
See Uniform Resource Identifier.
See unit of recovery identifier.
See Uniform Resource Locator.
See Uniform Resource Name.
In cross-site mirroring, pertaining to the mirror copy data state that indicates that the correct order of updates to the mirror copy from the production copy is being preserved, but the mirror copy may be outdated. The usable mirror copy data state occurs (a) when the system performs geographic mirroring in synchronous mode, (b) after successfully suspending geographic mirroring, and (c) when the mirror copy is successfully detached.
A database object that records each DML statement section that references a particular table or index and captures statistics about how that section affects each object as the section executes.
In i5/OS, a license management function that monitors usage by tracking the number of license users. Concurrent usage type indicates the usage limit is for the number of unique jobs using the product at the same time. Registered usage type indicates the usage limit is for the number of unique license users registered to use the product.
See user spool access method.
See Universal Serial Bus.
See flash drive.
See flash drive.
See flash drive.
USB memory drive
See flash drive.
USB pen drive
See flash drive.
See flash drive.
The attribute assigned to a direct access storage device (DASD) volume or system-managed tape volume that controls when the volume can be used to allocate new data sets. The use attributes for DASD volumes are public, private, and storage. The use attributes for system-managed tape volumes are scratch and private. See also scratch.
An object authority that allows the user to run a program or to display the contents of a file. Use authority combines object operational authority, read authority, and execute authority.
- The specification of a sequence of actions that a system can perform, interacting with users of the system. Use cases are used in system analysis to identify system requirements. See also scenario.
- A technique for identifying user requirement by providing scenarios that illustrate how users and systems interact. In WebSphere Commerce, a use case shows the flow of each user interaction in the starter store and acts as a template for creating a store.
A standard rule that matches an element or field against a predefined code table, specifies whether or not a compliance error is generated if the element or field does not contain one of the values in the code table, and stores a code’s description in another element or field.
A type of license, administered by the license server, that is effective for only a single instance of starting a product or using a service. The license server decrements the number of available use-once licenses each time the product or service is used.
- Any individual, organization, process, device, program, protocol, or system that uses the services of a computing system.
- A representation of an account on the server. Users can be members of groups. Rather than having its own list of users, the server imports accounts from authentication realms, including OpenStack Keystone services and LDAP servers. See also authentication realm, team.
A request made by user code to the operating system to abnormally terminate a routine. See also system abend.
- An administrative page in the service that specifies a user's name, login information, subscriptions, and roles.
- The login directory and other information that gives a user access to the system.
- In OSI X.400, one of two basic parts of electronic mail. A user agent is a program that provides access to the mail system. This program allows users to compose, send, and receive mail.
- A broad class of entities that can access servers across a network. This broad class includes desktop browsers, bots, and mobile devices, among others.
- An application that browses the web and leaves information about itself at the sites that it visits. In enterprise search, the web crawler is a user agent.
- A client that initiates a request for a local service to establish a connection to a remote server.
- One or more storage units used to isolate some objects from the other objects that are stored in the system ASP and other user ASPs. User ASPs are defined by the user.
- One or more auxiliary storage pools used to isolate journals, journal receivers, and save files from the other system objects stored in the system ASP. See also auxiliary storage pool, system ASP.
The product interfaces and technical product information that help users complete their tasks. User assistance includes wizards, interface instructions, and contextual assistance topics, as well as information centers and books.
The privileges, restrictions, and processing environments assigned to a user. See also group-related user attribute.
user attribute data set (UADS)
In Time Sharing Option (TSO), a partitioned data set with a member for each authorized user. Each member contains the appropriate passwords, user identifications, account numbers, logon procedure names, and user characteristics that define the user.
user block (ublock)
In kernel mode, the data structure that contains system information about a user process, such as its real and effective user IDs, the list of open file descriptors, and signal-handling settings.
The use of a work area in the processing program's address space for an I/O buffer; the Virtual Storage Access Method (VSAM) transmits the contents of a control interval between the work area and direct access storage without intermediary buffering.
An optional catalog used in the same way as the master catalog and pointed to by the master catalog. Employing a user catalog lessens the contention for the master catalog and facilitates volume portability.
user catalog connector
See catalog connector.
User Centered Design (UCD)
A development approach that helps ensure that application designs will meet the user's needs and provide usable applications. See also information architect.
A certificate associated with a user ID that is used to authenticate the user's identity, and can also represent a server. See also digital certificate.
- The classification of a user by the system task, such as security officer, security administrator, programmer, system operator, and user. Each user class has a set of special authorities depending on the security level of the system. The user class determines which options are shown on the IBM-supplied menus.
- See custom view.
- A z/VM privilege category assigned to a user of a guest virtual machine in the user's directory entry; each class specified allows access to a logical subset of all the z/VM Control Program (CP) commands.
In System i Access, the set of files, created by the System i Access administrator, that define the user's System i Access configuration and the functions used. The files include the configuration file and the command file.
A 4-byte value supplied to VTAM by an application program when certain macroinstructions (such as REQSESS) are issued. It is returned to the application program when subsequent events occur (such as entry to a SCIP exit routine upon receipt of BIND) that result from the procedure started by the original macroinstruction.
Information acquired during authentication that describes a user, group associations, or other security-related identity attributes, and that is used to perform services such as authorization, auditing, or delegation. For example, a user ID and password are credentials that allow access to network and system resources.
User Datagram Protocol (UDP)
An Internet protocol that provides unreliable, connectionless datagram service. It enables an application program on one machine or process to send a datagram to an application program on another machine or process.
user data set
In z/OS, a data set defined to RACF in which either the high-level qualifier of the data set name or the qualifier supplied by an installation exit routine is a RACF user ID. See also group data set.
user-defined aggregate (UDA)
An aggregate function that is not provided by the database server (is not built in) that includes extensions to built-in aggregates and newly defined aggregates. The database server manages all aggregates.
user-defined cast (UDC)
A cast that a user creates with the CREATE CAST statement. A user-defined cast typically requires a cast function. A user-defined cast can be an explicit cast or an implicit cast. See also cast.
- A character which is defined by an individual user or organization for assignment in one or more code pages. These characters are often ideographic characters, symbols or logos. Some standards, including Unicode, reserve coding space for user defined characters. The meaning of the user defined character can only be assured within the closed environment of the defining organization or by private agreement among cooperating users.
- A character that is created through the Character Generator Utility (CGU). CGU is an extension of the code page with special user-defined ideographic characters, symbols, or logos. User-defined characters may be present in some of the Japanese, Chinese, and Korean code pages.
In metric management, a column used to represent a value other than the actual or target. It may be an industry benchmark or any other useful additional numerical information for a period, including a calculation based on the other values of the metric. User-defined columns may be different for each metric type.
user-defined communications support
An i5/OS function that provides an application program interface (API). User-defined communications support allows user-written application programs to call routines to set up and use a communications protocol over a token-ring, Ethernet, or X.25 network.
- A data type that is defined for use in a relational database. One can define opaque data types and distinct data types. See also data type.
- A data type that is defined to the DB2 database system by using the CREATE TYPE statement, and can be referenced thereafter in SQL statements. See also distinct type.
user-defined edit code
A number (5 through 9) indicating that editing should be done on a numeric output field according to a pattern predefined to the system program. User-defined edit codes can take the place of edit words, so that repetitive coding of the same edit word is not necessary.
An event defined by the BTS application programmer. The BTS user-defined events are activity completion events, input events, and timer events. See also composite event, system event, timer event.
- A function defined by the user that provides a mechanism for extending C-SQL for use in formulas, including queries, field expressions, and rules.
- A user-defined routine that returns at least one value. A user-defined function can be written in SPL (SPL function) or in an external language that the database server supports (external function).
- An internal or external function created by the user. Internal functions are defined within a catalog. External functions are defined in an external, compiled module.
- A custom function that can be used to organize code in a policy. See also function.
- A function that is defined to the DB2 database system by using the CREATE FUNCTION statement and that can be referenced thereafter in SQL statements. See also built-in function, external function, function, routine, sourced function, SQL function, table function.
user-defined global variable
A global variable that is defined to the DB2 database system by using the CREATE VARIABLE statement and that can be referenced thereafter in SQL statements. See also built-in global variable, database global variable, global variable.
user-defined log (UDL)
An object that is associated with a hierarchy or catalog that stores custom content. See also UDL entry.
- A user-defined routine that does not return a value. You can write a user-defined procedure in SPL (SPL procedure) or in an external language that the database server supports (external procedure). See also procedure.
- A procedure that is defined to the DB2 database system by using the CREATE PROCEDURE statement and that can be referenced thereafter in SQL statements. See also built-in procedure, external procedure, procedure, routine, SQL procedure.
user-defined routine (UDR)
A routine that users write and register in the system catalog tables of a database, and that an SQL statement or another routine can invoke. A user-defined routine is written in SPL or in an external language (external routine) that the database server supports.
user-defined statistics (UDS)
Information about the opaque data type values in a database that is collected by the UPDATE STATISTICS statement, which calls user-defined functions to calculate the statistics. The optimizer uses these statistics to determine the fastest way to execute an SQL query.
user-defined structured type
See structured type.
A descriptor that is generated by a system or a process, for example, installation-created and node. See also ETO descriptor.
user domain object
An object on the system that can be accessed directly by a user state program. The object types that can be either system domain or user domain are: *USRSPC, *USRIDX, *USRQ, *PGM, *SQLPKG. All other object types are system domain. See also domain.
user dynamic storage area (UDSA)
A storage area in CICS that is allocated below the 16 MB line and reserved exclusively for those user application programs that execute in user-key and that reside below the 16 MB line.
user entry procedure (UEP)
The entry procedure, written by the application programmer, that is the target of a dynamic program call. This procedure gets control from the program entry procedure (PEP). See also program entry procedure.
- An application programming interface (API) that provides a call to an external program during the process flow of a message.
- A point in a program at which a user exit routine may be given control.
- A hook in the application that is triggered after a specific action. A user exit is used to customize the application.
- A customized routine that takes control at a specific point in an application. See also installation exit.
- An extended rule that enables a map to temporarily exit translation and perform functions that are not normally performed during translation.
user exit class
A Java class that adds custom logic to the processing of integration messages and executes before or after the external exit class executes for publish channels, enterprise services, and invocation channels. See also external exit class.
user exit program
A program, written by a user, that receives control at predefined user exit points. When a user exit program is invoked, the database manager passes control to the executable file. Only one user exit program can be invoked in a database manager instance.
user exit programming interface (XPI)
A CICS interface that provides global user exit programs with access to some CICS services. XPI consists of a set of function calls that you can use in your user exit programs to extend or modify CICS system functions.
user experience leader (UX leader)
An individual who uses knowledge of human-computer interaction and user interface design to interpret customers' requirements to create a product that is easy to learn and use, and ultimately to satisfy customer needs. See also interaction designer.
- A file containing information about all MERVA ESA users; for example, which functions each user is allowed to access. The user file is encrypted and can only be accessed by authorized persons.
- A text file that specifies the users who are allowed or forbidden to use licensed software products.
- A group that has specific field permissions within an organization level.
- A group consisting of one or more defined individual users, identified by a single group name.
- See customer group.
See initial heap.
- A file assigned to every user and server that uniquely identifies them to Notes and Domino.
- In the UNIX operating system, a string that uniquely identifies each user to the operating system.
- The name used to associate the user profile with a user when a user signs on to a system.
- The first part of a two-part network name used in the system distribution directory and in the office applications to uniquely identify a user. The network name is usually the same as the user profile name, but does not need to be. See also common user identification.
user identification and verification
The acts of identifying and verifying a RACF-defined user to the system during logon or batch job processing. RACF identifies the user by the user ID and verifies the user by the password or operator identification card supplied during logon processing or the password supplied on a batch JOB statement.
user identification number (uid)
A 4-byte, unsigned integer (uid) used to identify a user profile. See also group identification number.
- In i5/OS application programming interfaces, an object that provides a specific order for byte data according to the value of the data. User index objects reside in the user domain. The system-recognized identifier for the object type is *USRIDX.
- An index that a user creates explicitly with the CREATE INDEX statement. See also attached index, system index.
user interface block (UIB)
A control block used in the CALL DLI interface to pass information to the user program. It contains the address of the PCB address list (UIBPCBAL) from the schedule request, and the response code to each DL/I request. A definition of the UIB should only be included in the application program if the UIB is to be referenced. The UIB is acquired by the interface routine when an application program issues a schedule request specifying a pointer reference to be set with the address of the UIB.
user interface client
Any machine in the Gentran Server for Windows system other than the primary system controller or secondary controller(s). The user interface clients provide the functions that are necessary to monitor and control the system.
user interface manager (UIM)
A function of the operating system that provides a consistent user interface by providing comprehensive support for defining and running panels (displays), dialogs, and online help information.
See client journey.
Storage obtained by CICS in MVS open-key storage. It is for user application programs and their associated data areas. It can be accessed and modified by user applications and by CICS. See also CICS-key.
A private print-resource library owned by an individual user, accessed only when the name is specified by the owner in the JCL USERLIB parameter. See also system library.
user-maintained data table (UMT)
A type of CICS data table that has no CICS-supported association with its source data set after it has been loaded. Changes to the table are not automatically reflected in the source data set.
- The association of Information Integrator for Content user IDs and passwords to corresponding user IDs and passwords in one or more content servers. User mapping enables single logon to Enterprise Information Portal and multiple content servers.
- A process that associates users to operating system properties to enable access to Informix and to control the level of privileges.
- In a federated system, the association between the authorization ID at the federated server and the authorization ID at the data source. See also user option.
A mode in which a process is carried out in the user's program rather than in the kernel. See also kernel mode.
In a federated system, a parameter of the CREATE USER MAPPING or ALTER USER MAPPING statement to which values related to authorization are assigned. See also user mapping.
A portal that ties together all modules within Emptoris Sourcing. The user portal contains portlets each of which displays data from the specific area that it represents. The contents and display of the portal can be customized.
user printable area (UPA)
The area within the valid printable area (VPA) where user-generated data can print without causing an exception condition. See also physical printable area, valid printable area.
A particular function permission that can be assigned to specific user types. See also field permission.
- An object with a unique name that contains the user's password, the list of special authorities assigned to a user, and the objects the user owns. The system-recognized identifier for the object type is *USRPRF.
- A file in the user's home directory named .profile that contains shell commands that set initial user-defined characteristics and defaults for the login session.
- An entity such as a department or customer for whom services are being performed.
- A description of a user that includes such information as user ID, user name, password, access authority, and other attributes that are obtained when the user logs on. See also profile.
user proxy definition
A definition that maps remote and local user IDs, and enables users at remote nodes to submit work to the local node without explicitly defining user IDs and passwords in the processes, which eliminates having to share passwords with trading partners. See also secure point of entry.
- In i5/OS application programming interfaces, an object consisting of a list of messages that communicate information to other application programs. The system-recognized identifier for the object type is *USRQ.
- A queue that holds work items waiting to be completed by a user rather than by an automated process. Each user's queue displays as an inbox. See also queue.
- A database of known users and user-provided information that is used for authentication purposes.
- A collection of user information, such as user IDs and passwords, that is used as the basis for security control by a system such as a web application server.
user-replaceable module (URM)
See user-replaceable program.
A CICS program that is invoked at a particular point in CICS processing as if it were part of CICS code. You can modify the supplied program by including your own logic, or replace it with a version that you write yourself. Examples include the dynamic routing program, and the transaction restart program.
- An identifier that is assigned to a user that defines the set of permissions that are granted to that user.
- A role assigned to a user in a user account that determines whether a user can use the service and whether the user has the ability to perform administrative tasks.
user role group
A group that assigns membership to give a new user the appropriate level of access to the solution. Each new user is added as a member of the appropriate role group. There are different permission levels associated with each role group.
That part of a security facility that verifies that a user is authorized to (a) sign on to a local or remote system (b) run a transaction and (c) to access the resources and use the commands that a transaction invokes. See also session security.
In the IBM MQ Administration Interface (MQAI), the identifier that is placed with a data item into a data bag to identify the data item. IBM MQ provides predefined user selectors for IBM MQ objects.
A user-rating score that is derived from gathering users' application ratings from the major online retail application stores (for example, iTunes). The function crawls all ratings and reviews to generate a cumulative mobile app score that combines app quality, user satisfaction, and the overall amount of positive and negative feedback that users provide.
- In i5/OS application programming interfaces, an object consisting of a collection of bytes that can be used for storing any user-defined information. The system-recognized identifier for the object type is *USRSPC.
- The address space seen by a process in user mode.
- A set of control blocks, including a user block and one or more LTERM blocks. The message queues are associated with the dynamic user, as opposed to the physical terminal, and they are queued to the user ID.
- In kernel mode, the data area that contains information that must be accessible while a process runs. The user structure (defined in the /usr/include/sys/user.h header file) specifies the exact information that is kept in the user block; one user structure is allocated for each active process.
- A table that contains data about a company's customers or prospects, such as demographic information and contact names and addresses. User tables provide the data source for processes within a Campaign flowchart. The source of a user table is a relational database or flat file.
- In SQL replication, a table created for and used by an application before it is defined as a replication source. A user table is used as the source for updates to read-only target tables, consistent-change-data tables, replicas, and row-replica tables.
- A list of user IDs authorized to a System i finance job.
- An installation-defined table that is used to extend, modify, or delete the default processing specifications. See also table pair.
user temporary table space
A temporary table space that is used to store declared temporary tables. A user temporary table space is not created by default when a database is created. See also temporary table space.
The primary thread that the database server runs to service client applications. A user thread also includes a thread to service requests from the onmode utility, threads for recovery, and page-cleaner threads. See also thread.
- The amount of time a program is running in the CPU. Does not include time associated with operating system services provided to the program, the program's I/O time, or time in which other processes preempt the program's use of the CPU. See also system time.
- In UNIX, the time spent executing database manager code.
user token (UTOKEN)
The RACF security token that encapsulates or represents the security characteristics of a user. RACF assigns a UTOKEN to each user in the system. See also resource token, security token.
A description of a particular user’s abilities and the role they assume in a folder. User types include Standard User, Administrator and No Access. See also folder role.
See Unstructured Supplementary Service Data.
See Coordinated Universal Time.
Unicode Transformation Format, 16-bit encoding form, which is designed to provide code values for over a million characters and is a superset of UCS-2. The CCSID value for data in UTF-16 format is 1200. See also UCS-2, UTF-32, UTF-8.
Unicode Transformation Format, 8-bit encoding form, which is designed for ease of use with existing ASCII-based systems. The CCSID value for data in UTF-8 format is 1208. See also UCS-2, UTF-16, UTF-32.
- A provided resource, such as water, gas, or electricity.
- The provider of a resource such as water, gas, or electricity.
- A computer program in general support of computer processes. Examples of a utility are a diagnostic program, a trace program, and a sort program.
- A mechanism used to run different tasks to meet a specific business purpose. For example, importing data from a different database.
- In IBM MQ, a supplied set of programs that provide the system operator or system administrator with facilities in addition to those provided by the IBM MQ commands.
- The capability of a system, program, or device to perform the functions for which it is designed.
A Content Manager component that is used by the database utilities for scheduling purposes. You configure a utility server when you configure a resource manager or library server. There is one utility server for each resource manager and each library server.
A volume that is available to be used by the extended remote copy (XRC) function for maintenance purposes. The utility volume accumulates change data from the source that is used by the data mover software to update the target volume.
See user token.
See unshielded twisted pair.
See update time stamp.
See UNIX-to-UNIX Copy Program.
See Universally Unique Identifier.
See user value unit.
See user experience leader.