upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
An interface class that defines all of the methods that a business object implements and that an application can use. See also message class.
Industry:Software
An interface for creating, deleting, and accessing objects. Because XOM is object-oriented, each object belongs to a particular class, and classes can be derived from other classes, inheriting the characteristics of the original class. The representation of the object is transparent to the programmer; the object can be manipulated only through the XOM interface.
Industry:Software
(1) An alternative name used instead of a primary name.<br />(2) The user name for a server in an implementation repository.<br />(3) In an internet, a name assigned to a server that makes the server independent of the name of its host system. The alias must be defined in the domain name server.<br />(4) An assumed or actual association between two data entities, or between a data entity and a pointer.<br />(5) An alternative name used to identify a table, view, database, or nickname. An alias can be used in SQL statements to refer to a table, view, or database in the same DB2 system or subsystem or in a remote DB2 system or subsystem. See also server name, synonym.<br />(6) A pointer to another directory object. Aliases can be used within LDAP to reference entries anywhere within the directory tree.<br />(7) In Notes, a shortened form of a user name that can be used in any Notes application where directory lookup and type-ahead are supported, such as mail. Unlike the Notes user name and alternate name, aliases cannot appear in access control lists and execution control lists.<br />(8) In EGL generation, a name that is placed in the output source file in place of the name that was in the EGL source code. In most cases, the original name is aliased because it was not valid in the target generation language.<br />(9) An alternative name for an integrated catalog facility (ICF) user catalog, a file that is not a Virtual Storage Access Method (VSAM) file, or a member of a partitioned data set (PDS) or a partitioned data set extended (PDSE).
Industry:Software
(1) In computer security, a description of a user that includes such information as user ID, user name, password, access authority, and other attributes that are obtained when the user logs on.<br />(2) In LearningSpace - Virtual Classroom, a collection of permissions that control access to the product's features and functionality.<br />(3) In Lotus Learning Management System, a descriptive label an administrator creates and a user elects so that the user might be notified of potentially interesting courses.<br />(4) An object with a unique name that contains the user's password, the list of special authorities assigned to a user, and the objects the user owns. The system-recognized identifier for the object type is *USRPRF.<br />(5) An entity such as a department or customer for whom services are being performed.
Industry:Software
(1) In XML, a type that allows elements in its content and may carry attributes. See also simple type.<br />(2) A structure within a message. A complex type contains elements, attributes, and groups organized into a hierarchy.
Industry:Software
(1) An application program that has various functions distributed across MVS systems in a multisystem environment.<br />(2) In XCF, an authorized application that uses XCF coupling services.
Industry:Software
(1) In computer security, a process that ensures that the identities of both the sender and the receiver of a network transaction are true.<br />(2) In computer security, verification of the identity of a user or process and the construction of a data structure that contains the privileges that were granted to the user or process.<br />(3) The process by which a system verifies a user's identity. User authentication is completed by a security facility outside the DB2 database system, often part of the operating system or a separate product.<br />(4) The security service that provides proof that a user of a computer system is genuinely who that person claims to be. Common mechanisms for implementing this service are passwords and digital signatures. Authentication is distinct from authorization; authentication is not concerned with granting or denying access to system resources.<br />(5) The process of validating the identity of a user or server.
Industry:Software
(1) In XRF (CICS Transaction Server only), a remote SNA VTAM terminal connected through a boundary network node IBM 3745/3725/3720 Communication Controller with an NCP that supports XRF. Such a terminal has a backup session to the alternate CICS system.<br />(2) A terminal for which the alternate IMS pre-opens backup sessions for the primary sessions that the active IMS opens; VTAM/NCP switches sessions from primary to backup at takeover.
Industry:Software
(1) An application that provides a recommendation or suggestion that is based on input from the user. Advisors do not perform functions or change system values.<br />(2) In Performance Tools, a tool used to analyze data collected by the performance monitor function of the operating system. The advisor analyzes a collection of performance data and produces a list of conclusions and recommendations to improve system performance.
Industry:Software
(1) In computer security, assurance that sensitive information is not visible to an eavesdropper.<br />(2) The security service that protects sensitive information from unauthorized disclosure. Encryption is a common mechanism for implementing this service.
Industry:Software
© 2024 CSOFT International, Ltd.