- Industry: Computer
- Number of terms: 98482
- Number of blossaries: 0
- Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
User definition of all cluster components. Component information is stored in the ODM. Components include cluster name and ID, and information about member nodes, adapters, and network modules.
Industry:Software
The specification of the desired placement of the cursor as part of a FETCH statement (for example, BEFORE, AFTER, NEXT, PRIOR, CURRENT, FIRST, LAST, ABSOLUTE, and RELATIVE). See also scrollability.
Industry:Software
The virtual LAN that connects nodes to each other and to the management server through an Ethernet connection. Installation and administration tasks are done on the cluster VLAN.
Industry:Software
User interface software, from Open Systems Foundation, for use with the X Window System.
Industry:Software
The specification of the desired placement of the cursor as part of a FETCH statement, with respect to a rowset (for example, NEXT ROWSET, LAST ROWSET, or ROWSET STARTING AT ABSOLUTE n). See also row-positioned fetch orientation.
Industry:Software
The virtual local area network (VLAN) that connects the cluster nodes and management server to the site network. Applications are accessed and run on cluster nodes over the public VLAN. The public VLAN can be connected to nodes through a second Ethernet adapter in each node, or by routing to each node through the Ethernet switch.
Industry:Software
User-defined accounting information that is sent to DRDA servers.
Industry:Software
The specification of the desired placement of the cursor as part of a FETCH statement, with respect to a single row (for example, NEXT, LAST, or ABSOLUTE n). See also rowset-positioned fetch orientation.
Industry:Software
The virtual object space representation of actual system resources that is used for applying ACLs and POPs and for authorizing user access. See also protected object policy, protected object.
Industry:Software
User-defined characteristics of an asset, for example: support contact and confidential.
Industry:Software