upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) In VTAM, a key for locating the control blocks that represent a session. The key is created during session establishment and deleted when the session ends.<br />(2) The VTAM/NCP communication ID. This value is given to IMS and is used by VTAM and IMS to identify a session between IMS and a VTAM logical unit.
Industry:Software
(1) A written document that defines the security controls that you institute for your computer systems. A security policy describes the risks that you intend these controls to minimize and the actions that should be taken if someone breaches your security controls.<br />(2) In label-based access control, a database object that is associated with one or more tables and that defines how LBAC can be used to protect those tables. The security policy defines what security labels can be used, how the security labels are compared to each other, and whether optional behaviors are used. See also label-based access control, security label.
Industry:Software
(1) In COBOL, the state of a file after running an OPEN statement, with the INPUT phrase specified for that file, and before running a CLOSE statement, without the REEL or UNIT phrase specified for that file.<br />(2) In MFS, the way in which input fields from certain devices are defined by the user to be scanned by MFS. See also record mode, stream mode.
Industry:Software
(1) In VTAM, a resource identified by its real name and its real network identifier.<br />(2) In the NetView Graphic Monitor Facility, an individual network resource represented by a real object.
Industry:Software
(1) A z/OS C/C++ application that does not use the services of the dynamic z/OS C/C++ run-time library or of the Language Environment. Under z/OS C support, this ability is a feature of the System Programming C support.<br />(2) An application that is created to run without the run-time environment or library with which it was developed.
Industry:Software
(1) In COBOL, two alphabetic characters (FD or SD) that identify the type of file description entry.<br />(2) In RPG, two characters (L0 through L9 and LR) that control calculation and output processing during total time.
Industry:Software
(1) In VTAM, a technique for configuring a network that allows for the consolidation of many network management functions for the entire network in a single host processor.<br />(2) A configuration in which the VTAM subsystem that owns the terminals is in a different MVS image from the active or the alternate CICS system.
Industry:Software
(1) Actions performed by the CICS system to construct the environment in the CICS region to enable CICS applications to be run. The stage of the XRF process when the active or the alternate CICS system is started, signs on to the control data set, and begins to issue its surveillance signal.<br />(2) The process that reads the initialization statements and creates the tables and control blocks used throughout the JES3 program.
Industry:Software
An interactive workshop, lecture or seminar that is delivered over the Web.
Industry:Software
An interchangeable metal band that contains the print characters used by some printers.
Industry:Software
© 2024 CSOFT International, Ltd.