- 行业: Computer
- Number of terms: 98482
- Number of blossaries: 0
- Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
(1) In COBOL, an access method in which the program-specified value of a key data item identifies the logical record that is obtained from, deleted from, or placed into a relative or indexed file.<br />(2) A process where individual records can be referred to in a nonsequential manner. See also access mode.<br />(3) Pertaining to a computer's process of reading data from and writing data to storage in a nonsequential manner.
Industry:Software
(1) In COBOL, one or more successive paragraphs or sections, within the Procedure Division, that direct the computer to perform some action or series of related actions.<br />(2) In the Integrated Language Environment (ILE) model, a set of self-contained high-level language (HLL) statements that performs a particular task and returns to the caller. Individual languages have different names for this concept of a procedure. In C, a procedure is called a function.<br />(3) A sequenced set of statements that may be used at one or more points in one or more computer programs, and that usually has one or more input parameters and yields one or more output parameters. (T)<br />(4) A routine that can be invoked using the SQL CALL statement to perform operations that can include both host language statements and SQL statements. See also external procedure, SQL procedure, routine.
Industry:Software
(1) A written document that defines the security controls that you institute for your computer systems. A security policy describes the risks that you intend these controls to minimize and the actions that should be taken if someone breaches your security controls.<br />(2) In label-based access control, a database object that is associated with one or more tables and that defines how LBAC can be used to protect those tables. The security policy defines what security labels can be used, how the security labels are compared to each other, and whether optional behaviors are used. See also label-based access control, security label.
Industry:Software
(1) In COBOL, two alphabetic characters (FD or SD) that identify the type of file description entry.<br />(2) In RPG, two characters (L0 through L9 and LR) that control calculation and output processing during total time.
Industry:Software
(1) Actions performed by the CICS system to construct the environment in the CICS region to enable CICS applications to be run. The stage of the XRF process when the active or the alternate CICS system is started, signs on to the control data set, and begins to issue its surveillance signal.<br />(2) The process that reads the initialization statements and creates the tables and control blocks used throughout the JES3 program.
Industry:Software
Un workshop interattivo, conferenza o seminario che è trasportato attraverso il Web.
Industry:Software
(1) In communication, a technique used by layered protocols by which a layer adds control information to the protocol data unit (PDU) from the layer it supports. In this respect, the layer encapsulates the data from the supported layer. In the Internet suite of protocols, for example, a packet would contain control information from the physical layer, followed by control information from the network layer, followed by the application protocol data. See also decapsulation.<br />(2) In object-oriented programming, the technique that is used to hide the inherent details of an object, function, or class from client programs.
Industry:Software
(1) Alert information that is provided as text or is encoded using a method in which code points provide an index into short units of stored text. The use of generic alerts prevents the receiver from having to recognize and understand each unique problem for which an alert is sent. See also nongeneric alert.<br />(2) A Systems Network Architecture (SNA) Network Management Vector that enables a product to signal a problem to the network. CICSPlex SM uses generic alerts as part of its interface to NetView.
Industry:Software
(1) In communications, a data link command or response used to perform a basic test of the station-to-station link connection.<br />(2) A discipline in the software-engineering process whose purpose is to integrate and test the system.
Industry:Software
(1) In WebSphere Commerce Payments, a relationship between the merchant and the financial institution that processes transactions for that merchant. There can be multiple accounts for each payment cassette.<br />(2) An entity that contains a set of parameters that define the application-specific attributes of a user, which include the identity, user profile, and credentials.<br />(3) A logical grouping of configuration items that is used to control access. An account can represent a company in a data center that supports more than one company, a department, or other groupings.
Industry:Software