upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
A character string in which each character is represented by 2 bytes. The character string does not contain shift-in (SI) and shift-out (SO) characters. See also DBCS-only.
Industry:Software
(1) To register to access data published by another application or system. See also publish.<br />(2) In SQL replication, to enable tables or views registered as replication targets to receive initial source data and subsequent changes from tables or views registered as replication sources.
Industry:Software
A character string that can contain both single-byte and double-byte characters.
Industry:Software
(1) To remotely access objects at the instance level.<br />(2) To make a device a logical part of a network.<br />(3) In z/OS, to create a task that can execute concurrently with the attaching code.<br />(4) In Notes, to store a file with a document or form. The file, or attachment, is stored with the document or form in the database until one of them is deleted.<br />(5) In Sametime, to include a file on the whiteboard when scheduling a meeting or during a meeting.
Industry:Software
A character string that consists of both single-byte character set (SBCS) data and bracketed double-byte character set (DBCS) data.
Industry:Software
(1) To remove an object from its workflow and define the suspension criteria needed to activate it. Later activating the object enables it to continue processing.<br />(2) In cross-site mirroring, to temporarily stop geographic mirroring. If the mirror copy contained usable data when suspended, the mirror copy still contains usable, though possibly outdated, data.<br />(3) To pause a process instance.
Industry:Software
A character string that designates a set of privileges and can be used to verify authority. An authorization ID can represent an object, an individual user, an organizational group, a function, or a database role.
Industry:Software
(1) To remove the call stack entry and transfer control back to the calling procedure or program in the previous call stack entry.<br />(2) One or more products, their prices, and the quantity specified, that a customer has selected for a refund from the store in which the product was originally purchased.
Industry:Software
A character string used by MERVA to identify a field in a network buffer. For example, for SWIFT field 30, the field tag is :30:.
Industry:Software
(1) To replace repetitive bits in a file or folder with control bits so that the file or folder takes up less space when saved.<br />(2) To compress a database, in order to reclaim space freed by the deletion of documents and attachments.
Industry:Software
© 2024 CSOFT International, Ltd.