upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) Space reserved by a file system to contain the names of its objects.<br />(2) In XML and XQuery, a uniform resource identifier (URI) that provides a unique name to associate with the element, attribute, and type definitions in an XML schema or with the names of elements, attributes, types, functions, and errors in XQuery expressions.<br />(3) A part of the model in which the names may be defined and used. Within a namespace, each name has a unique meaning.<br />(4) A category used to group similar types of identifiers. See also namespace scope.<br />(5) The scope within which a Common Information Model (CIM) schema applies.<br />(6) The set of all possible names composed of characters from the binder's character set, within which no duplicates are allowed. All external symbols have an assigned name space during binder processing and within program objects.<br />(7) A logical container in which all the names are unique. The unique identifier for an artifact is composed of the namespace and the local name of the artifact.
Industry:Software
(1) Specification for uncompressed voice for PSTN and Voice over Internet Protocol access.<br />(2) An audio codec that produces a better sound quality (contains more frequencies) than G.723, but consumes more network bandwidth and is unusable over a 56K connection (requires 64K). G.711 consumes fewer processor cycles than G.723.
Industry:Software
(1) Storage within a storage facility that is configured such that multiple homogenous or divergent hosts can access the storage concurrently. The storage has a uniform appearance to all hosts; the host programs that access the storage must have a common model for the information on a storage device.<br />(2) An area of storage that is the same for each virtual address space. Because it is the same space for all users, information stored there can be shared and does not have to be loaded in the user region.
Industry:Software
(1) Suspension of a process, such as execution of a computer program, caused by an external event and performed in such a way that the process can be resumed.<br />(2) A signal sent by an I/O device to the processor when an error has occurred or when assistance is needed to complete I/O. An interrupt usually suspends the running of the program that is currently running.<br />(3) A condition that applies to a simulation that causes the simulation execution to be halted if the condition is met.<br />(4) To stop a process in such a way that it can be resumed.
Industry:Software
(1) That portion of the CICS region that holds the CSA, management modules, control tables, and resident application programs.<br />(2) That portion of a control program that always remains in central storage.
Industry:Software
(1) The 8-character subscript on the DESTID initialization statement or command that corresponds to a combination of a first-level destination and a second-level destination that determines where data should be sent in a JES2 installation. A DESTID can be either a symbolic destination or an explicit destination. See also explicit destination, symbolic destination.<br />(2) The 3-byte destination ID of the destination device, in the 0xDomainAreaALPA format.
Industry:Software
(1) The ability of equipment to be transported manually.<br />(2) The ability of a program to run on more than one type of computer system without modification.<br />(3) The ability of a programming language to compile successfully on different operating systems without requiring changes to the source code.<br />(4) The ability to use Virtual Storage Access Method (VSAM) data sets with different operating systems. Volumes whose data sets are cataloged in a user catalog can be removed from storage devices of one system, moved to another system, and mounted on storage devices of that system. Individual data sets can be transported between operating systems using access method services (AMS).
Industry:Software
(1) The ability of two or more entities to function in the same system or network.<br />(2) During migration, the state during which two releases exist in the same data sharing group.
Industry:Software
(1) The ability to access a protected object, such as a file or directory. The number and meaning of permissions for an object are defined by the access control list.<br />(2) The authority granted to users to give them access to an application's features and functions.<br />(3) Authorization to perform activities, such as reading and writing local files, creating network connections, and loading native code.<br />(4) An entitlement or privilege that governs how a user interacts with the repository, specified by role, not the individual user.
Industry:Software
(1) The ability to access and manage all CICS systems and their resources in a CICSplex from a single terminal or user session.<br />(2) The control interface that sends commands to one or more members of an IMSplex and receives command responses.
Industry:Software
© 2025 CSOFT International, Ltd.