- Branche: Computer
- Number of terms: 98482
- Number of blossaries: 0
- Company Profile:
Sometimes referred to as “Big Blue” IBM is a multinational corporation headquartered in Armonk, New York. It manufactures computer hardware and software and provides information technology and services.
In Backup, Recovery, and Media Services, an object or document that has been selected by an archive control group to archive. Archive candidates are reported on the Archive Candidate Report, which is produced by the Start Archive using BRM (STRARCBRM) command.
Industry:Software
In computer security, a public key and a private key. When the key pair is used for encryption, the sender uses the public key to encrypt the message, and the recipient uses the private key to decrypt the message. When the key pair is used for signing, the signer uses the private key to encrypt a representation of the message, and the recipient uses the public key to decrypt the representation of the message for signature verification.
Industry:Software
In fibre-channel technology, a mode in which a loop port (L_port) in a loop is inactive and cannot arbitrate or send frames, but can retransmit any received transmissions. This mode is entered if there are more than 127 devices in a loop and an arbitrated loop physical address (AL_PA) cannot be acquired. See also participating mode, loop port.
Industry:Software
In Backup, Recovery, and Media Services, an object that defines the types of physical containers that are used to store and transport removable media. Container classes are distinguished by attributes such as capacity and media class.
Industry:Software
In computer security, an assault on a network that brings down one or more hosts on a network such that the host is unable to perform its functions properly. Network service is interrupted for some period.
Industry:Software
In fibre-channel technology, a switching technique that allows a routing decision to be made and acted upon as soon as the destination address of a frame is received. See also route.
Industry:Software
In Backup, Recovery, and Media Services, pertaining to media that is available for a rewrite operation. Media is automatically expired when both the retention period (expiration date) and storage duration have been satisfied.
Industry:Software
In computer security, an assault on a network that involves an intruder who tries to break into or take over a computer that belongs to someone else. Spoofing is an example of an active attack.
Industry:Software
In fibre-channel technology, a transmission word that is an IDLE or an ARBx primitive signal. Fill words are transmitted between frames, primitive signals, and primitive sequences to keep a fibre-channel network active.
Industry:Software
In Backup, Recovery, and Media Services, the comparison of actual media statistics to standard industry statistics for that media.
Industry:Software