upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
A task that watches a process and its associated repositories, and produces output when a certain condition becomes true (for example, a threshold value has been reached).
Industry:Software
A task-optimized storage device directly attached to a network that operates independently of the general-purpose file servers.
Industry:Software
A TCP/IP application that transforms System i 5250 data streams to Hypertext Markup Language (HTML) for dynamic display on Web browsers. This allows a user to run System i applications from any workstation that has a Web browser.
Industry:Software
A TCP/IP connection to an IIOP server. Requests enter the server via inbound IIOP connections and flow to other servers via outbound IIOP connections.
Industry:Software
A TCP/IP function that allows a user to translate multiple Internet Protocol (IP) addresses to another single IP address. Masquerade NAT is used to hide one or more IP addresses on an internal network behind an IP address that will be made public. Traffic can initiate from the private internal addresses only.
Industry:Software
A technical expert who creates, runs, and reviews data analysis processe
Industry:Software
A technical specification that defines a mechanism to associate semantic annotations with Web services that are described using Web Service Description Language (WSDL).
Industry:Software
A technical tool or technique that is used to implement a security service. A mechanism might operate by itself, or in conjunction with others, to provide a particular service. Examples of security mechanisms include access control lists, cryptography, and digital signatures.
Industry:Software
A technique by which the address space manager (ASM) at one node controls the rate of transmission of BIND requests of a sending ASM at another node. BIND pacing can be used to prevent BIND standoff, in which each of two nodes has reserved most of its resources for sessions it is attempting to initiate through the other and thus rejects any BINDs received from the other.
Industry:Software
A technique for compressing data. This technique replaces some character strings, which occur repeatedly within the data, with codes. The encoded character strings are then kept in a common dictionary, which is created as the data is being sent.
Industry:Software
© 2024 CSOFT International, Ltd.