upload
International Business Machines
Industry: Computer
Number of terms: 98482
Number of blossaries: 0
Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) A data array in which the various elements can be moved along the X and Y axes to produce a different aggregate view.<br />(2) A table characterized by having one metric as a column dimension and all the rest of the metrics represented as row dimensions.
Industry:Software
(1) A data item used for storing numbers or number representations in a manner that permits these numbers to be increased or decreased by the value of another number or to be set to an arbitrary value.<br />(2) A register or storage location used to accumulate the number of occurrences of an event.<br />(3) A representation of information that is cumulative up until the sample is taken. The counter counts values that increase, such as the number of deadlocks. Counters are reset when an instance or a database is stopped and restarted. See also gauge.<br />(4) A binary string that is used by some block cipher modes in an exclusive-OR (XOR) operation. It is incremented and then applied in the encryption or decryption of each block of data. For a given key, a counter should never be repeated.<br />(5) A specialized metric used to keep track of the number of occurrences of a specific situation or event. For example, you can use a counter to track the number of times that a task is started within a process, where that task is contained in a loop.
Industry:Software
(1) A defined set of characters with no coded representation assumed that can be recognized by a configured hardware or software system. A character set may be defined by alphabet, language, script, or any combination of these items.<br />(2) A set of binary codes that represent specific text characters.
Industry:Software
(1) A record of the current state of the database environment.<br />(2) In Tivoli NetView, a copy of a map that reflects the topology and status of the map's nodes and links at a given moment in time.<br />(3) A copy of changed data in the active files and directories of a file system with the exception of the inode number, which is changed to allow application programs to distinguish between the snapshot and the active files and directories.
Industry:Software
(1) A record of the processing of a computer program or transaction. The information collected from a trace can be used to assess problems and performance.<br />(2) A DB2 for z/OS facility that provides the ability to collect monitoring, auditing, performance, accounting, statistics, and serviceability (global) data.<br />(3) In the Unified Modeling Language (UML), a dependency that indicates a historical or process relationship between two elements that represent the same concept without specific rules for deriving one from the other.<br />(4) In DB2 replication, a facility that is used to collect monitoring, auditing, and performance data for the Capture program, the Q Capture program, the Apply program, the Q Apply program, or the Replication Alert Monitor.<br />(5) To record data that provides a history of events occurring in the system.
Industry:Software
(1) A column or an ordered collection of columns that is identified in the description of a table, index, or referential constraint. The same column can be part of more than one key.<br />(2) A cryptographic mathematical value that is used to digitally sign, verify, encrypt, or decrypt a message. See also private key, public key.<br />(3) One or more characters within an item of data that are used to uniquely identify a record and establish its order with respect to other records. See also alternate-index record.<br />(4) A button on a keyboard or key pad.<br />(5) Information that characterizes and uniquely identifies the real-world entity that is being tracked by a monitoring context.
Industry:Software
(1) A pattern or template that is applied to an Internet Protocol (IP) address to specify which bits are significant and which bits are irrelevant.<br />(2) A pattern of bits or characters that controls the keeping, deleting, or testing of portions of another pattern of bits or characters.<br />(3) Data that is used to extract information that is stored in another location.
Industry:Software
(1) A pattern to help the user identify the location of keys on a keyboard, functions assigned to keys on a keyboard, or switches and lights on a control panel.<br />(2) An object used to create new objects of the same type. The newly created object has the same characteristics as the template.<br />(3) In REXX, a guide that allows strings to be parsed by words (delimited by blanks), by explicit matching of strings, or by specifying numeric positions.<br />(4) A family of C++ classes or functions with variable types.<br />(5) A DB2 utilities output data set descriptor that is used for dynamic allocation. A template is defined by the TEMPLATE utility control statement.<br />(6) In WebSphere Commerce, a predefined skeleton or pattern that determines how information displays on a Web page. The template defines characteristics such as the location and type of text and images, and background color.<br />(7) A model of a new Notes database. If it is a design template, it will update database design elements created from the template.<br />(8) A standard layout used in such system communications as e-mail, approval requests, and error messages.<br />(9) A HATS resource that describes the relatively static portion of the Web pages presented by the HATS application, including a banner and navigation area.
Industry:Software
(1) A continuous sequence of data elements being transmitted one character at a time, or intended for transmission, using a defined format.<br />(2) In the CVS team programming environment, a shared copy of application resources that is updated by development team members as they make changes. The stream represents the current state of the project.<br />(3) A method of topic partitioning that is used by applications that connect to MQSeries Publish/Subscribe SupportPac brokers.<br />(4) An object that specifies configuration rules for a UCM view.<br />(5) A file access object that allows access to an ordered sequence of characters, as described by the ISO C standard. Such objects can be created by the fdopen() or fopen() functions, and are associated with a file descriptor. A stream provides the additional services of user-selectable buffering and formatted input and output.
Industry:Software
(1) A rule that limits the values that can be inserted, deleted, or updated in a table. See also check constraint, primary key, referential constraint, unique constraint, unique key, foreign key, informational constraint.<br />(2) A place in the system where contention for a resource is affecting performance.<br />(3) See threshold.<br />(4) A semantic condition or restriction. Certain constraints are predefined in the UML, others may be user defined. Constraints are one of three extensibility mechanisms in UML. See also tagged value, comment.<br />(5) A limit to set controls on the start and finish dates on task elements of the project, such as start-no-earlier-than or finish-no-later-than.<br />(6) In lexical analysis, a morphotactics rule that accurately processes compound words using dictionaries of word formation elements.
Industry:Software
© 2025 CSOFT International, Ltd.