upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
The queue of Tivoli NetView submaps that are used to navigate to a particular submap.
Industry:Software
The process of backing up selected files or directories from a client domain.
Industry:Software
The result of the first translation phase of language compilers for the extended program model. The intermediate representation of a program is in the form of machine instruction source and is used as the input to the compiler's final phase, the program resolution monitor.
Industry:Software
The practice of masquerading as a trusted system to try to obtain confidential information. For example, when a would-be intruder sets up a client system with an IP address that is trusted by another system, it is called IP spoofing.
Industry:Software
The RACF facility by which a security administrator can control access to fields or segments in a RACF profile.
Industry:Software
The process of binding naming systems so that the aggregate system can process composite names that span the naming systems.
Industry:Software
The result of two tables being joined under one of two conditions. The first condition is where the tables reside in a single-partition database partition group in the same database partition. The second condition is where the tables are in the same database partition group, the number of partitioning columns is the same, the columns are partition compatible, both tables use the same partitioning function, and pairs of the corresponding partitioning key columns participate in the equijoin predicates. See also partition-compatible join.
Industry:Software
The practice of monitoring or eavesdropping on electronic transmissions. Information that is sent across the Internet might pass through many routers before it reaches its destination. Any of those routers can sniff the transmission and attempt to interpret the information. Passwords or other confidential information that is sent in an unencrypted form might be discovered.
Industry:Software
The rack component that logically controls the application of alternating current power to the units in the rack.
Industry:Software
The process of breaking an object into its component parts.
Industry:Software
© 2024 CSOFT International, Ltd.