- 行业: Computer
- Number of terms: 98482
- Number of blossaries: 0
- Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) An alternative name used instead of a primary name.<br />(2) The user name for a server in an implementation repository.<br />(3) In an internet, a name assigned to a server that makes the server independent of the name of its host system. The alias must be defined in the domain name server.<br />(4) An assumed or actual association between two data entities, or between a data entity and a pointer.<br />(5) An alternative name used to identify a table, view, database, or nickname. An alias can be used in SQL statements to refer to a table, view, or database in the same DB2 system or subsystem or in a remote DB2 system or subsystem. See also server name, synonym.<br />(6) A pointer to another directory object. Aliases can be used within LDAP to reference entries anywhere within the directory tree.<br />(7) In Notes, a shortened form of a user name that can be used in any Notes application where directory lookup and type-ahead are supported, such as mail. Unlike the Notes user name and alternate name, aliases cannot appear in access control lists and execution control lists.<br />(8) In EGL generation, a name that is placed in the output source file in place of the name that was in the EGL source code. In most cases, the original name is aliased because it was not valid in the target generation language.<br />(9) An alternative name for an integrated catalog facility (ICF) user catalog, a file that is not a Virtual Storage Access Method (VSAM) file, or a member of a partitioned data set (PDS) or a partitioned data set extended (PDSE).
Industry:Software
(1) In computer security, a description of a user that includes such information as user ID, user name, password, access authority, and other attributes that are obtained when the user logs on.<br />(2) In LearningSpace - Virtual Classroom, a collection of permissions that control access to the product's features and functionality.<br />(3) In Lotus Learning Management System, a descriptive label an administrator creates and a user elects so that the user might be notified of potentially interesting courses.<br />(4) An object with a unique name that contains the user's password, the list of special authorities assigned to a user, and the objects the user owns. The system-recognized identifier for the object type is *USRPRF.<br />(5) An entity such as a department or customer for whom services are being performed.
Industry:Software
(1) An application program that has various functions distributed across MVS systems in a multisystem environment.<br />(2) In XCF, an authorized application that uses XCF coupling services.
Industry:Software
(1) In computer security, a process that ensures that the identities of both the sender and the receiver of a network transaction are true.<br />(2) In computer security, verification of the identity of a user or process and the construction of a data structure that contains the privileges that were granted to the user or process.<br />(3) The process by which a system verifies a user's identity. User authentication is completed by a security facility outside the DB2 database system, often part of the operating system or a separate product.<br />(4) The security service that provides proof that a user of a computer system is genuinely who that person claims to be. Common mechanisms for implementing this service are passwords and digital signatures. Authentication is distinct from authorization; authentication is not concerned with granting or denying access to system resources.<br />(5) The process of validating the identity of a user or server.
Industry:Software
(1) In computer security, assurance that sensitive information is not visible to an eavesdropper.<br />(2) The security service that protects sensitive information from unauthorized disclosure. Encryption is a common mechanism for implementing this service.
Industry:Software
(1) An application written with the Content Manager APIs to customize a user interface.<br />(2) An application written with object-oriented or Internet APIs to access content servers from Information Integrator for Content.<br />(3) An application, running on a workstation and linked to a client, that gives the application access to queuing services on a server.<br />(4) A user application, written in a supported programming language other than Java, that communicates directly with the Client daemon.<br />(5) A storage management program that initiates Common Information Model (CIM) requests to the CIM agent for the device.
Industry:Software
(1) In computer security, assurance that the information that arrives at a destination is the same as the information that was sent.<br />(2) The quality of data that exists as long as destruction, alteration, loss of consistency, or loss of data are prevented.
Industry:Software
(1) In computer security, the process of transforming encoded text or ciphertext into plaintext.<br />(2) The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password.
Industry:Software
(1) An archive file on a target server that represents a sequential media volume on a source server.<br />(2) A tape volume that resides in a tape volume cache of a virtual tape server (VTS). Whether the volume resides in the tape volume cache as a virtual volume or on a stacked volume as a logical volume (LVOL) is transparent to the host.
Industry:Software
(1) In computer security, the right granted to a user to communicate with or make use of a computer system.<br />(2) The process of granting a user, system, or process either complete or restricted access to an object, resource, or function.<br />(3) The process by which data in the database catalog is used to obtain information about an authenticated user, such as which database operations the user can perform and which data objects the user can access. See also privilege, authority level, database authority.<br />(4) The process of granting or denying access to a network resource. Security systems use a two-step process: after authentication has verified that a user is who she says she is, authorization allows the user access to various resources based on the user's identity.<br />(5) The method that determines which portlets a user or a user group can access.<br />(6) The process of obtaining permission to perform specific actions.
Industry:Software