upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
A persistent cache where event records are saved until a polling adapter can process them. See also event record, event table.
Industry:Software
A profile that provides the same authority to a group of users.
Industry:Software
A process by which an image is reduced or enlarged in size to fit a given area on the display.
Industry:Software
A persistent table that holds temporary data and is defined with the SQL statement CREATE GLOBAL TEMPORARY TABLE. Information about created temporary tables is stored in the DB2 catalog and can be shared across application processes See also temporary table, declared temporary table.
Industry:Software
A profile that specifies where remote alerts for the service processor should be sent.
Industry:Software
A process by which service providers can define the mapping of Uniform Resource Identifier (URI) algorithms to cryptographic algorithms that are used for XML digital signature and XML encryption.
Industry:Software
A persistent, historical data store for events (or messages). The Warehouse node within a message flow supports the recording of information in a database for subsequent retrieval and processing by other applications.
Industry:Software
A program (part of the emergency restart function) that is invoked during emergency restart, and that reads backout information (written to the restart data set by the recovery utility program) for task, message, DL/I, and file tables.
Industry:Software
A process by which SQL statements are bound after they are precompiled. All static SQL statements are prepared for execution at the same time. See also dynamic bind, incremental bind, automatic bind.
Industry:Software
A person assigned to control all of the security authorizations provided with the system. A security officer can, for example, remove password or resource security or add, change, or remove security information about any system user.
Industry:Software
© 2024 CSOFT International, Ltd.