Sie sind auf Seite 1von 467

16 megabyte line IBM

2FA
3270 application IBM
3270 data stream IBM
3270 pass-through mode IBM
3GL IBM
abend IBM
abend dump IBM
abnormal end IBM
abnormal termination IBM
ASN
accept IBM
ACCEPT command IBM
ATP QA testing
accepted SYSMOD IBM
access IBM
access authority IBM
access control IBM
ACB IBM
ACE
ACE
ACL
ACL
ACLs
ACS Azure
access list IBM
access method IBM
ACID properties IBM
ACK IBM
ARM
AA
AD
ADAC
ADAM
ADBA
AD CS
AD DS
AD FS
AD LDS
ADMT
AD RMS
ADSI
ADUC
ADWS
ASP
ASP.NET
ADO
address IBM
ARP oracle solaris Networking Terms
ARP. oracle solaris Networking Terms
address space IBM
AWE
AMODE IBM
ALS IBM
adjacent node IBM
adjacent subarea IBM
ADJSSCP IBM
AU
administrator IBM
AES oracle solaris Networking Terms
AES
AES. oracle solaris Networking Terms
APPN IBM
Advanced Peer-to-Peer Networking. IBM
APPC IBM
ATA
ATP
alert IBM
alias IBM
AQAP QA testing
allocate IBM
ALLOCATE command IBM
alphanumeric character IBM
dynamic packet filter oracle solaris Networking Terms
AAM
AWS
ANR
AFIPS QA testing
ANSI QA testing
ARIN QA testing
ASCII IBM
anonymous user IBM
ANR IBM
ANSI IBM
AOR IBM
APAR IBM
APAR fix IBM
APF IBM
APF-authorized IBM
API IBM
APPC IBM
application IBM
application layer IBM
ALM
AOS
application program IBM
API
ARR
ASP ITIL® Service Management
AUT QA testing
application-instance DVIPA IBM
AOR IBM
apply IBM
APPLY command IBM
APPN IBM
appn IBM
APPN end node IBM
AIW IBM
APPN network IBM
APPN network node IBM
APPN node IBM
approximate CSCN
ARB flow IBM
ABR IBM
ABR IBM
ARM IBM
ARP IBM
ARPANET IBM
AIAT QA testing
encapsulation oracle solaris Networking Terms
ASCII IBM
ASID IBM
ASSEM entry IBM
assembler IBM
assembler language IBM
ACM QA testing
AJAX
asynchronous processing IBM
ATM IBM
ATM IBM
ACID
AID IBM
AT-TLS IBM
AC
ACC QA testing
ASQ
flow attributes oracle solaris Networking Terms
audit IBM
ACS
AEAD
authentication IBM
AP
authority IBM
AIA
authorization IBM
authorization checking IBM
APAR IBM
APF IBM
automated operations IBM
ASTF QA testing
ATRT QA testing
ATG QA testing
ATLM QA testing
automatic call IBM
ACD ITIL® Service Management
automatic call library IBM
ADDM
ADR
automatic library call IBM
automatic restart IBM
automatic restart management IBM
ASM
AVMA
AWR
automation IBM
auxiliary storage IBM
availability IBM
AM ITIL® Service Management
AMIS ITIL® Service Management
AMIS QA testing
AMC QA testing
AAD
AADJ
to Microsof
AAS
ADLA
ADE
AIP
AKS
ASR
DTU Microsof
backbone IBM
background IBM
BITS Microsof
background job IBM
backout IBM
backplane IBM
backup IBM
BDC Microsof
backup host IBM
BAL IBM
bandwidth IBM
BONDING Bandwidth On Demand Interop
QA testing
BMR Microsof
base function IBM
base level system IBM
BMC Microsof
BIU IBM
batch IBM
batch job IBM
BMP IBM
batch processing IBM
BCP IBM
BPA Microsof
CTP Microsof
BEX IBM
big endian IBM
Base64 Microsof
binary data IBM
BLOB Microsof
BLOB
bind IBM
binder IBM
BIOS Microsof
BERT QA testing
BTDF Microsof
BTS Microsof
BLK IBM
BLKSIZE IBM
BLOB IBM
block IBM
block size IBM
BSOD Microsof
book package IBM
BGP oracle solaris Networking Terms
BGP. oracle solaris Networking Terms
border node IBM
BF IBM
BVA QA testing
BPAM IBM
branch extender IBM
BrNN IBM
BrEx IBM
bridge IBM
BYOD Microsof
BYOK Microsof
BYO Microsof
BCS QA testing
BS QA testing
BS7925-1 QA testing
BSI ITIL® Service Management
BrNN IBM
broadcast IBM
broadcast search IBM
BITE QA testing
BSAM IBM
buffer IBM
BCHR Microsof
buffer pool IBM
BIST QA testing
bus IBM
to Microsof
BAM Microsof
BCDR Microsof
BCM ITIL® Service Management
BCP ITIL® Service Management
BIA ITIL® Service Management
BI Microsof
BIDS Microsof
BRM ITIL® Service Management
BR QA testing
BRS QA testing
BRE Microsof
BSM ITIL® Service Management
B2B Microsof
B2B
B2C
B2E Microsof
BX IBM
bypass IBM
byte multiplexer channel IBM
byte stream IBM
C language IBM
CTRACE IBM
CA IBM
cabinet IBM
cable IBM
cache IBM
cache structure IBM
cage IBM
CQD Microsof
CBCP oracle solaris Networking Terms
CBCP. oracle solaris Networking Terms
called routine IBM
CMM ITIL® Service Management
CMMI QA testing
CMMI ITIL® Service Management
CMM QA testing
capacity IBM
CMIS ITIL® Service Management
CAPEX ITIL® Service Management
CISP QA testing
carriage control character IBM
CR IBM
CSMA/CD IBM
CSMA/CD IBM
CSCL IBM
CART IBM
CSS Microsof
case-sensitive IBM
catalog IBM
cataloged data set IBM
cataloged procedure IBM
CDS
CEMT IBM
CDS IBM
central directory server IBM
CEC IBM
CEC IBM
CPU Microsof
CPU IBM
CPU IBM
CP IBM
CP IBM
CPC IBM
CPC IBM
central storage IBM
CA oracle solaris Networking Terms
CA. oracle solaris Networking Terms
CA Microsof
CRL oracle solaris Networking Terms
CRL oracle solaris Networking Terms
CSR Microsof
CF IBM
CFRM IBM
CGI IBM
CHAP oracle solaris Networking Terms
CHAP. oracle solaris Networking Terms
CAB ITIL® Service Management
CR QA testing
channel IBM
channel adapter IBM
CCW IBM
CCA IBM
CDLC IBM
channel interface IBM
CIP IBM
channel path IBM
channel path identifier IBM
CHPID IBM
CSS IBM
CSS IBM
CTC IBM
CTC IBM
CTCA IBM
channel-to-channel connection IBM
CTC connection IBM
character IBM
CDATA
CLOB
CLOB IBM
checkpoint IBM
checkpoint data set IBM
checkpoint write IBM
CYOD Microsof
CBC
circuit switching IBM
CBA Microsof
CP Microsof
CRC QA testing
client IBM
CAL Microsof
CAS Microsof
client-server IBM
CSE Microsof
CDM Microsof
CSP Microsof
cluster IBM
CFS
CSS
CVU
CMOS IBM
CMS IBM
CMT IBM
CNN IBM
COBOL IBM
CDMA Microsof
code page IBM
code point IBM
coexistence IBM
collision IBM
command IBM
CART IBM
CLIST IBM
command prefix IBM
COMMAREA IBM
CSV Microsof
COTS ITIL® Service Management
COTS QA testing
commit IBM
COBOL IBM
CIM Microsof
CIL Microsof
CLI Microsof
CLR Microsof
CLAW IBM
CN Microsof
CORBA
CORBA QA testing
COPS QA testing
CORE
CSA IBM
CSA IBM
CWM
communication controller IBM
communication line IBM
CCL IBM
CCL IBM
Communications Server IBM
CSM IBM
CSM IBM
compatibility IBM
compilation unit IBM
compiler IBM
compiler options IBM
CMOS IBM
component IBM
CCM ITIL® Service Management
CFIA ITIL® Service Management
COM Microsof
COM
component trace IBM
composite network node IBM
CCP oracle solaris Networking Terms
CCP oracle solaris Networking Terms
CAST QA testing
CERT QA testing
CTI ITIL® Service Management
CAD Microsof
CASE QA testing
concentrator IBM
condition code IBM
configuration IBM
CA QA testing
CC QA testing
CID QA testing
CI ITIL® Service Management
CI QA testing
CMDB Microsof
CMDB ITIL® Service Management
CMP QA testing
CMS ITIL® Service Management
CMT QA testing
CM QA testing
CICSplex IBM
connection IBM
CMADMIN
CMAK Microsof
CMGW
connectionless protocol IBM
connection-oriented protocol IBM
connectivity IBM
consistent copy IBM
console IBM
console group IBM
CSI IBM
CDN Microsof
CSI ITIL® Service Management
CSIP ITIL® Service Management
control block IBM
CI IBM
CI IBM
COBIT ITIL® Service Management
control region IBM
CSECT IBM
CSECT IBM
control statement IBM
CU IBM
CU IBM
control unit address IBM
controller IBM
CNA Microsof
convergence IBM
conversation IBM
conversational IBM
CMS IBM
UTC
CORBA IBM
CSP ITIL® Service Management
corequisite SYSMODs IBM
corrective service IBM
CoS IBM
COA QA testing
COF QA testing
COQ QA testing
CKD IBM
count-key data IBM
couple data set IBM
coupling facility IBM
coupling facility channel IBM
coupling services IBM
CP-CP session IBM
CLPA IBM
CLPA IBM
CRUD Microsof
CRUD QA testing
CDR QA testing
CE QA testing
CSF ITIL® Service Management
CSFs QA testing
CDP Microsof
crossbar switch IBM
CDRSC IBM
CDRM IBM
CDRM IBM
cross-memory linkage IBM
XCF IBM
XES IBM
cross-system restart IBM
cryptographic key IBM
cryptography IBM
CNG Microsof
cumulative service tape IBM
CU Microsof
CICS IBM
CICS IBM
CRM Microsof
CRU IBM
CRU IBM
flow oracle solaris Networking Terms
cylinder IBM
DACL Microsof
daemon IBM
DAF IBM
DASD IBM
DASD volume IBM
DAX Microsof
DCB oracle solaris Networking Terms
DCB. oracle solaris Networking Terms
DCB Microsof
DCBX oracle solaris Networking Terms
DCBX. oracle solaris Networking Terms
DCTCP Microsof
data class IBM
data communication IBM
DC IBM
DCaaS Microsof
data control block IBM
DCB IBM
DDL Microsof
ddname IBM
ddname IBM
data definition statement IBM
DDS QA testing
data division IBM
DES oracle solaris Networking Terms
DES Microsof
DES
DES. oracle solaris Networking Terms
DES QA testing
DEP Microsof
DFSORT IBM
DFD QA testing
data in transit IBM
data integrity IBM
DLC IBM
data link layer IBM
DLSw IBM
DLP Microsof
DML Microsof
DPM Microsof
DSU oracle solaris Networking Terms
DSU oracle solaris Networking Terms
data set IBM
data set backup IBM
data set label IBM
data sharing IBM
data space IBM
data stream IBM
data type IBM
data warehouse IBM
DBMS Microsof
database IBM
DAD
DaaS Microsof
DAG Microsof
DBCC Microsof
DDD QA testing
DBMS IBM
DBPITR
DBWn
datagram IBM
DTLS Microsof
DLMP aggregation oracle solaris Networking Terms
DLMP aggregation. oracle solaris Networking Terms
DIKW ITIL® Service Management
DIKW QA testing
DB2 data sharing group IBM
DD statement IBM
DDL LCR
deadlock IBM
deallocate IBM
DCLGEN IBM
DCLGEN IBM
dedicated IBM
default IBM
DRE QA testing
DARPA QA testing
DEF QA testing
deferred restart IBM
deleted function IBM
DMZ oracle solaris Networking Terms
DMZ. oracle solaris Networking Terms
DoS
DDoS Microsof
USA QA testing
U.S. QA testing
UK QA testing
dependent LU IBM
DLUR IBM
DLUS IBM
DER Microsof
destination IBM
destination node IBM
DDD QA testing
bandwidth delay product oracle solaris Networking Terms
device IBM
device address IBM
device control unit IBM
device number IBM
ICKDSF IBM
device type IBM
DFSMS IBM
DFSMShsm™ IBM
DFSORT IBM
DFS™ IBM
Dynamic Host Configuration Protocol Microsof
DUID oracle solaris Networking Terms
DUID. oracle solaris Networking Terms
DHTMLX Microsof
DaRT Microsof
dialog IBM
CB Microsof
CBB Microsof
DH Microsof
digital certificate IBM
DDS QA testing
Dijkstra's shortest path algorithm IBM
DASD IBM
DAS
DMA oracle solaris Networking Terms
DMA Microsof
DMA. oracle solaris Networking Terms
DMA IBM
DSR oracle solaris Networking Terms
DSR. oracle solaris Networking Terms
directed Locate search IBM
directory IBM
DIT Microsof
DIT
DSRM Microsof
disabled wait state IBM
disaster recovery IBM
DR Microsof
disk IBM
DISP IBM
dispatch IBM
Dnnn
dispatching priority IBM
display console IBM
DN oracle solaris Networking Terms
DN
DN. oracle solaris Networking Terms
DCOM Microsof
DCOM
distributed computing IBM
DCE
DCE IBM
distributed data IBM
distributed directory services IBM
DFS IBM
Microsof Microsof
DFSR Microsof
DTP
distributing host IBM
DLIB IBM
distribution zone IBM
DLIB IBM
DLL IBM
DLSw IBM
DLU IBM
DLUR IBM
DLUS IBM
DMA IBM
computing Microsof
DNS IBM
DNU Microsof
DIY Microsof
DNF Microsof
DOM
DOM QA testing
DTD
domain IBM
DC Microsof
DFL Microsof
domain name server IBM
DNS oracle solaris Networking Terms
DNS Microsof
DNS
DNS. oracle solaris Networking Terms
DOI oracle solaris Networking Terms
DOI. oracle solaris Networking Terms
DOS Microsof
DNX Microsof
DBCS Microsof
DBCS IBM
DBCS IBM
doubleword IBM
downwardly compatible IBM
drain IBM
driving system IBM
DSCP oracle solaris Networking Terms
DSCP. oracle solaris Networking Terms
DS DB IBM
DSA Microsof
dsname IBM
DSORG IBM
DTC Microsof
dump IBM
duplex IBM
dvipa IBM
DAC Microsof
dynamic allocation IBM
DBA QA testing
DDM Microsof
DDNS Microsof
DHCP oracle solaris Networking Terms
DORA Microsof
DHCP. oracle solaris Networking Terms
DHTML Microsof
DLR Microsof
DLL IBM
DR oracle solaris Networking Terms
dynamic reconfiguration IBM
DR. oracle solaris Networking Terms
dynamic routing protocol IBM
DSDM QA testing
DVIPA IBM
dynamic VPN IBM
dynamic XCF links IBM
DLL Microsof
DLL
ELS ITIL® Service Management
EB IBM
EBCDIC IBM
EBN IBM
e-business IBM
EC IBM
ECSA IBM
EVB oracle solaris Networking Terms
EVB. oracle solaris Networking Terms
EDT IBM
EVS oracle solaris Networking Terms
EVS. oracle solaris Networking Terms
EIA QA testing
element IBM
EDT IBM
ECAB ITIL® Service Management
EN IBM
bandwidth control oracle solaris Networking Terms
ESP oracle solaris Networking Terms
ESP. oracle solaris Networking Terms
encapsulation IBM
enclave IBM
encrypt IBM
end node IBM
endian IBM
ETS oracle solaris Networking Terms
ETS. oracle solaris Networking Terms
enterprise IBM
Enterprise Extender IBM
EJB
ESCON IBM
ERD QA testing
entry area IBM
entry name IBM
entry point IBM
entry point name IBM
EOF IBM
ephemeral port number IBM
ECMP oracle solaris Networking Terms
ECMP. oracle solaris Networking Terms
ER IBM
ESCON IBM
ESCON channel IBM
ESCD IBM
ESCM IBM
EMIF IBM
esoteric IBM
eSCM–CL ITIL® Service Management
eSCM–SP ITIL® Service Management
Ethernet IBM
ETR IBM
ECMA QA testing
ETSI QA testing
EVM
EVMD
exabyte IBM
exception SYSMOD IBM
EXCP IBM
executable IBM
executable program IBM
explicit route IBM
EBCDIC IBM
EBN IBM
extended MCS console IBM
XRC IBM
ESSID oracle solaris Networking Terms
ESSID. oracle solaris Networking Terms
XML
XSL
XSLFO
XSLT
ENM oracle solaris Networking Terms
ENM. oracle solaris Networking Terms
external reference IBM
ETR IBM
XP QA testing
failover IBM
FDT oracle solaris Networking Terms
FDT. oracle solaris Networking Terms
FMEA QA testing
FMEA ITIL® Service Management
fanout IBM
FAN
Fast Ethernet IBM
FMRI oracle solaris Networking Terms
FMRI. oracle solaris Networking Terms
FTA ITIL® Service Management
FDDI IBM
feature IBM
feature code IBM
FDD QA testing
FIPS
U.S. QA testing
U.S. QA testing
FEP IBM
fetch IBM
FFST IBM
FICON® IBM
Fiber Distributed Data Interface IBM
fiber link IBM
fiber optic cable IBM
FCoE oracle solaris Networking Terms
FCoE. oracle solaris Networking Terms
FICON IBM
FICON IBM
FID IBM
FRU IBM
FIFO IBM
file IBM
FTP IBM
FTP QA testing
FILEDEF IBM
FIN IBM
firewall IBM
FFST IBM
FIFO IBM
fix IBM
fixed-length record IBM
FlashCopy® IBM
FMID IBM
FDA QA testing
footprint IBM
foreground IBM
foreground job IBM
foreign key IBM
fork IBM
FID, FID field IBM
Fortran IBM
forward explicit route IBM
forwarding IBM
frame IBM
frame relay IBM
FAQ QA testing
FRSN IBM
FRU IBM
FTP IBM
FTPD IBM
full screen mode IBM
full-duplex IBM
fullword IBM
fullword boundary IBM
function IBM
FC QA testing
FMID IBM
FPA QA testing
FnPt QA testing
FP QA testing
FVT QA testing
FA QA testing
FDD QA testing
GVRP. oracle solaris Networking Terms
gateway IBM
gateway node IBM
Gb IBM
GB IBM
Gbps IBM
GDG IBM
GVRP oracle solaris Networking Terms
GPFS
GTF IBM
GDG IBM
generic IBM
GLDv3 oracle solaris Networking Terms
GIS
GDPS® IBM
LRS segment
DSC Microsof
DNVM Microsof
Gigabit Ethernet IBM
gigabyte IBM
global access checking IBM
GCS
LMSn
GDS
GV$
GES
LMD
LMON
global resource serialization IBM
global resource serialization complex IBM
GSD
global zone IBM
GTA QA testing
GTAC QA testing
GOSIP QA testing
GUI QA testing
gratuitous ARP IBM
Gregorian calendar IBM
group IBM
GTF IBM
guest IBM
GUI IBM
half-duplex IBM
handshake IBM
hardcopy log IBM
hardware IBM
HCD IBM
HCM QA testing
HMC IBM
firewall oracle solaris Networking Terms
hardware unit IBM
HMAC oracle solaris Networking Terms
HMAC. oracle solaris Networking Terms
HASP IBM
HCD IBM
head of string IBM
HIPAA QA testing
heat sink IBM
hexadecimal IBM
HFS IBM
HFS IBM
HIPO QA testing
HACMP
HOL QA testing
HLL IBM
highly parallel IBM
HiperSockets™ IBM
HLL IBM
HMC IBM
HOLDDATA IBM
hop IBM
host IBM
HBA
hot plug IBM
hot-swap IBM
HASP IBM
HPR IBM
HTTP IBM
HTTP server IBM
hub IBM
I/O IBM
I/O cage IBM
I/O cluster IBM
I/O device IBM
IAC IBM
IBM IBM
IBM Security Server IBM
IBM Support Center IBM
SE IBM
ICMP IBM
ICN IBM
ICSF IBM
IDCAMS IBM
IA oracle solaris Networking Terms
IA. oracle solaris Networking Terms
IAID oracle solaris Networking Terms
IAID. oracle solaris Networking Terms
IDS IBM
IEEE IBM
iet IBM
IKE IBM
image IBM
IMS IBM
IMS DB IBM
IMS DB data sharing group IBM
node oracle solaris Networking Terms
redirect oracle solaris Networking Terms
outcome oracle solaris Networking Terms
broadcast oracle solaris Networking Terms
independent LU IBM
IMS IBM
ISM ITIL® Service Management
ISMS ITIL® Service Management
IT ITIL® Service Management
ITIL QA testing
IaaS QA testing
IPL IBM
initial storage allocation IBM
initiator IBM
initiator/terminator IBM
input/output IBM
IOCDS IBM
IODF IBM
I-P-0 QA testing
install IBM
installation exit IBM
IEEE QA testing
instruction line IBM
chat script oracle solaris Networking Terms
IDE
IDE QA testing
ISDN IBM
ISDN TA oracle solaris Networking Terms
ISDN TA. oracle solaris Networking Terms
ISDN QA testing
lSLE QA testing
interactive IBM
IPCS IBM
ISPF IBM
IVR ITIL® Service Management
interchange node IBM
IDD QA testing
IDL QA testing
IRR ITIL® Service Management
internal reader IBM
IEC QA testing
ISO ITIL® Service Management
ISO QA testing
Internet IBM
IANA oracle solaris Networking Terms
IANA. oracle solaris Networking Terms
BOOTP oracle solaris Networking Terms
BOOTP. oracle solaris Networking Terms
ICMP oracle solaris Networking Terms
ICMP. oracle solaris Networking Terms
ICMP IBM
IIOP
IKE oracle solaris Networking Terms
IKE. oracle solaris Networking Terms
IP IBM
IPCP oracle solaris Networking Terms
IPCP. oracle solaris Networking Terms
IPsec QA testing
IPCP. oracle solaris Networking Terms
IPv4 oracle solaris Networking Terms
IPv4. oracle solaris Networking Terms
IPv6 oracle solaris Networking Terms
IPv6. oracle solaris Networking Terms
IR oracle solaris Networking Terms
IR. oracle solaris Networking Terms
IRC QA testing
ISAKMP oracle solaris Networking Terms
ISAKMP. oracle solaris Networking Terms
ISAKMP QA testing
ISP ITIL® Service Management
IPC
interrupt IBM
intranet IBM
CAML Microsof
DQS Microsof
intrusion detection service IBM
IOCDS IBM
IOCP IBM
IODF IBM
IOP IBM
IP address IBM
IP layer IBM
IPMP oracle solaris Networking Terms
IPMP. oracle solaris Networking Terms
IP network IBM
IPQoS oracle solaris Networking Terms
IPQoS. oracle solaris Networking Terms
IP route IBM
IPsec oracle solaris Networking Terms
IPsec. oracle solaris Networking Terms
IP Security Architecture IBM
IP IBM
IPA IBM
IPCS IBM
IPL IBM
IPSec IBM
IPv4 IBM
IPv6 IBM
IQDIO IBM
ISC IBM
ISDN IBM
ISMF IBM
ISPF IBM
ISPF/PDF IBM
ITSCM ITIL® Service Management
ITSM ITIL® Service Management
itSMF ITIL® Service Management
ISG ITIL® Service Management
ITIL ITIL® Service Management
ITSO IBM
IVP IBM
J2EE
JAXP
JAXB
JDBC
JDK
JNDI
JRE
JSR
JVM
JSP
JCL IBM
JES IBM
JES2 IBM
JES3 IBM
job IBM
job class IBM
JCL IBM
JCL IBM
JES IBM
job priority IBM
job separator pages IBM
job step IBM
JAD QA testing
JTC1 QA testing
Julian date IBM
jumper cable IBM
Kb IBM
KB IBM
Kbps IBM
kernel IBM
KDC
KPI ITIL® Service Management
key ring IBM
KWIC
KSDS IBM
keyword IBM
KBSA QA testing
KEDB ITIL® Service Management
KSDS IBM
LAN IBM
LAN segment IBM
Language Environment IBM
LOB
LOBs
LRO oracle solaris Networking Terms
LRO. oracle solaris Networking Terms
LIFO IBM
LCSS IBM
LCU IBM
LDAP IBM
LDIF
LEN node IBM
library IBM
LIC IBM
LIC IBM
licensed program IBM
LIFO IBM
LDAP oracle solaris Networking Terms
LDAP
LDAP. oracle solaris Networking Terms
LDAP IBM
LOS ITIL® Service Management
line switching IBM
LCSAJ QA testing
LOC QA testing
link IBM
LACP oracle solaris Networking Terms
LACP. oracle solaris Networking Terms
LCP oracle solaris Networking Terms
LCP. oracle solaris Networking Terms
link layer IBM
LLDP oracle solaris Networking Terms
LLDP. oracle solaris Networking Terms
link library IBM
LPA IBM
link state IBM
link station IBM
linkage editor IBM
linked list IBM
link-edit IBM
list structure IBM
little endian IBM
LLC IBM
LMOD IBM
load balancing IBM
load module IBM
load modules IBM
LAN IBM
LSQA IBM
local topology database IBM
Locate search IBM
lock structure IBM
LGWR
LCR
LCSS IBM
LCU IBM
LPAR IBM
logical partitioning IBM
logical subsystem IBM
LU IBM
LUN
LUNs
logical unit type 6.2 IBM
LVM
LPAR IBM
logoff IBM
logon IBM
LOGREC IBM
LSRT QA testing
loop IBM
loosely coupled IBM
LEN IBM
LCL QA testing
LP IBM
LPA IBM
LPAR IBM
LRECL IBM
LSPR IBM
LSQA IBM
LU IBM
LU-LU session IBM
MoSCoW QA testing
MAC IBM
MAC address IBM
machine check interruption IBM
machine readable IBM
macro IBM
macro instruction IBM
main task IBM
mainframe IBM
major node IBM
M_o_R ITIL® Service Management
MAS IBM
master catalog IBM
master IODF IBM
master trace IBM
MTU oracle solaris Networking Terms
MTU. oracle solaris Networking Terms
Mb IBM
MB IBM
Mbps IBM
MCS IBM
MCS console IBM
MDH IBM
MTBF QA testing
MTBF ITIL® Service Management
MTBSI ITIL® Service Management
MTTCF QA testing
MTTF QA testing
MTTR
MTTR ITIL® Service Management
MTTR QA testing
MTRS ITIL® Service Management
MAC IBM
MAC address oracle solaris Networking Terms
MB IBM
member IBM
memory dump IBM
MPF IBM
message queue IBM
message text IBM
MAPI
MAN IBM
microcode IBM
microprocessor IBM
AGPM
App-V
BCS Microsof
DRaaS Microsof
MS-CHAP oracle solaris Networking Terms
MS-CHAP. oracle solaris Networking Terms
MS DTC
DBE Microsof
MIF IBM
migration IBM
migration data host IBM
MBR
UK QA testing
minor node IBM
mixed complex IBM
MLTG IBM
MNLB IBM
MDD QA testing
modulator-demodulator IBM
MCS IBM
modification level IBM
module IBM
Monitor I, II, III IBM
monoplex IBM
MPC IBM
MSU IBM
MTU IBM
multi-access spool configuration IBM
multicast IBM
MCS IBM
MIF IBM
MVS IBM
multiplexer channel IBM
multiprocessing IBM
MP IBM
multisystem application IBM
multisystem console support IBM
multisystem environment IBM
multisystem sysplex IBM
multitasking IBM
mutable connection IBM
MVS IBM
MVS/ESA IBM
name server IBM
ns IBM
NBS QA testing
NCLOB
NCSA QA testing
NIST
NIST QA testing
NAU IBM
NCP IBM
NPV ITIL® Service Management
network IBM
NAU IBM
NAT oracle solaris Networking Terms
NAT. oracle solaris Networking Terms
network administrator IBM
NAS
NCP oracle solaris Networking Terms
NCP. oracle solaris Networking Terms
NCU oracle solaris Networking Terms
NCU. oracle solaris Networking Terms
network controller IBM
NFS oracle solaris Networking Terms
Network File System IBM
NFS
NFS. oracle solaris Networking Terms
network hardware technician IBM
network ID IBM
NIS oracle solaris Networking Terms
NIS
NIS. oracle solaris Networking Terms
NI
NIC oracle solaris Networking Terms
NIC
NIC. oracle solaris Networking Terms
NIC IBM
NJE IBM
network layer IBM
NN IBM
network node server IBM
network operator IBM
NPI
network protocol IBM
NS
NTP oracle solaris Networking Terms
NTP
NTP. oracle solaris Networking Terms
network topology database IBM
next sequential instruction IBM
NFS IBM
NFTP IBM
NHDR IBM
NIC IBM
NIP IBM
NLP IBM
NN IBM
NFR QA testing
nonpageable region IBM
nonreentrant IBM
nonstandard labels IBM
NPM IBM
BKF Microsof
nucleus IBM
NIP IBM
null IBM
numerics IBM
n-way IBM
OAF IBM
object deck IBM
object decks IBM
OLM
ORD QA testing
ORB
OKRs QA testing
network layer oracle solaris Networking Terms
OGC ITIL® Service Management
OPSI ITIL® Service Management
offline IBM
offset IBM
OLTP IBM
OLU IBM
OMPROUTE server IBM
Rx oracle solaris Networking Terms
online IBM
OLTP
OSPF IBM
OSA IBM
OSI
OSI IBM
OSI model oracle solaris Networking Terms
OSI model. oracle solaris Networking Terms
OSI QA testing
OpenSSH IBM
operating system IBM
OCM QA testing
OPEX ITIL® Service Management
OLA ITIL® Service Management
operations log IBM
operator commands IBM
operator message IBM
OFA
OCI
OCFS
OCR
ODP.NET
EMCA
HARD
OIFCFG
OMF
ONS
OO4O
ODBC
OPI
OraMTS
ILB oracle solaris Networking Terms
ILB. oracle solaris Networking Terms
KMF oracle solaris Networking Terms
KMF. oracle solaris Networking Terms
SID
XDK
ORB IBM
OCT
OASIS
OS/390 IBM
OSA IBM
oscillator IBM
OSI IBM
OSN IBM
OSPF IBM
output group IBM
output writer IBM
overlay IBM
DCM Microsof
packet IBM
IP header. oracle solaris Networking Terms
packet mode operation IBM
packet switching IBM
page IBM
page fault IBM
pageable region IBM
paging IBM
paging device IBM
parallel channel IBM
parallel OEMI IBM
parallel processing IBM
Parallel Sysplex IBM
parameter IBM
PV NIC. oracle solaris Networking Terms
parmlib IBM
parmlib member IBM
PCDATA
partially qualified data set name IBM
partitionable CPC IBM
PDS IBM
PDSE IBM
partitioning IBM
password IBM
PAP oracle solaris Networking Terms
PAP. oracle solaris Networking Terms
patch panel IBM
patchport IBM
PIU IBM
PBA ITIL® Service Management
PC IBM
PCHID IBM
PCOM IBM
PE IBM
peer network IBM
PPRC IBM
percolate IBM
PFS oracle solaris Networking Terms
PFS. oracle solaris Networking Terms
performance administration IBM
PCA QA testing
PHB oracle solaris Networking Terms
PHB. oracle solaris Networking Terms
peripheral border node IBM
PCIe oracle solaris Networking Terms
PCIe. oracle solaris Networking Terms
peripheral device IBM
peripheral node IBM
peripheral subnetwork boundary IBM
permanent connection IBM
permanent data set IBM
PIPEDA QA testing
PFK IBM
PFK capability IBM
PA QA testing
PCHID IBM
PCHID IBM
PF oracle solaris Networking Terms
PF. oracle solaris Networking Terms
physical layer IBM
physical partition IBM
PU IBM
PP IBM
PIN IBM
PIU IBM
PL/I IBM
PDCA ITIL® Service Management
platorm IBM
PaaS QA testing
PIM QA testing
PIM QA testing
PSI QA testing
PLPA IBM
PLU IBM
point of presence IBM
pointer IBM
point-to-multipoint network IBM
point-to-point network IBM
PPP oracle solaris Networking Terms
PPP. oracle solaris Networking Terms
policy IBM
port IBM
port number IBM
PVID oracle solaris Networking Terms
PVID. oracle solaris Networking Terms
portability IBM
POSIX IBM
PoS IBM
POSIX IBM
PIR QA testing
PIR ITIL® Service Management
Diagnostic Tests QA testing
power-on reset IBM
PPPoE. oracle solaris Networking Terms
PPPoE oracle solaris Networking Terms
PPRC IBM
PPT IBM
PTP oracle solaris Networking Terms
PTP. oracle solaris Networking Terms
PDR QA testing
preprocessor IBM
PFS ITIL® Service Management
preventive service IBM
PSP IBM
primary key IBM
printer IBM
PFC oracle solaris Networking Terms
PFC. oracle solaris Networking Terms
PVLAN oracle solaris Networking Terms
PVLAN. oracle solaris Networking Terms
POF QA testing
PCRTS QA testing
Problem Management IBM
PT QA testing
PTR QA testing
procedure IBM
processor IBM
processor controller IBM
PR/SM IBM
processor storage IBM
production system IBM
profile IBM
PPM ITIL® Service Management
PE-PTF IBM
PERT QA testing
program fetch IBM
PFK IBM
PGA
program interruption IBM
program level IBM
program library IBM
program management IBM
program mask IBM
program module IBM
program number IBM
program object IBM
PSW IBM
PTF IBM
PMBOK ITIL® Service Management
PSA ITIL® Service Management
PSO ITIL® Service Management
PRINCE2 ITIL® Service Management
protocol IBM
protocol stack IBM
protocol suite IBM
PSH IBM
PSP IBM
PSS IBM
PSW IBM
PTF IBM
PU IBM
PKI oracle solaris Networking Terms
PKI
PKI. oracle solaris Networking Terms
PUT IBM
QDIO IBM
QSAM IBM
qualified name IBM
qualifier IBM
QA ITIL® Service Management
QA QA testing
QC QA testing
QUES QA testing
QMS QA testing
QMS ITIL® Service Management
QoS QA testing
queue IBM
QDIO IBM
QSAM IBM
RACF IBM
raised floor IBM
RAD QA testing
RAS IBM
RDW IBM
read access IBM
reader IBM
real address IBM
RAT QA testing
real storage IBM
reason code IBM
receive IBM
RECEIVE command IBM
RECEIVE processing IBM
RECFM IBM
RCM oracle solaris Networking Terms
RCM. oracle solaris Networking Terms
record IBM
RPF QA testing
record data IBM
recording format IBM
recoverability IBM
recovery IBM
RMAN
RPO
RPO ITIL® Service Management
recovery system IBM
RTO
RTO ITIL® Service Management
recursive routine IBM
redundancy IBM
RAID IBM
RAID
reenterable IBM
reentrant IBM
RIB QA testing
refreshable IBM
register IBM
RSA IBM
RIMs IBM
RDBMS
RDN
release IBM
reliability IBM
remote copy IBM
RJE IBM
RMI QA testing
remote operations IBM
RFC QA testing
RFC ITIL® Service Management
RFC IBM
RFC QA testing
RFP QA testing
RH IBM
RU IBM
RTM QA testing
RTM QA testing
reserved storage allocation IBM
RMODE IBM
resolver IBM
RACF IBM
RMF IBM
RM
RRS IBM
RU IBM
RACI ITIL® Service Management
restore IBM
RESTORE command IBM
REXX IBM
resynchronization IBM
return code IBM
ROA ITIL® Service Management
ROI ITIL® Service Management
ROI QA testing
reusability IBM
RARP oracle solaris Networking Terms
RARP. oracle solaris Networking Terms
reverse explicit route IBM
RST QA testing
CRL Microsof
RFC IBM
RH IBM
RIM IBM
RIP IBM
RJE IBM
RMF IBM
RMODE IBM
rollback IBM
RCA ITIL® Service Management
RCA QA testing
RSS IBM
router IBM
routine IBM
routing IBM
routing code IBM
RIP oracle solaris Networking Terms
RIP. oracle solaris Networking Terms
RIP IBM
RIPng oracle solaris Networking Terms
RIPng. oracle solaris Networking Terms
routing protocol IBM
routing table IBM
row LCR
RRI IBM
RSA IBM
RSN IBM
RST IBM
RTP IBM
RTT IBM
RU IBM
run IBM
runtime IBM
runtime IBM
runtime environment IBM
SAF IBM
SAP IBM
US Act ITIL® Service Management
SATF IBM
save area IBM
scalability IBM
scan attack IBM
SDLC IBM
SDSF IBM
SDUMP macro IBM
SE IBM
SHA
SHA-1. oracle solaris Networking Terms
Secure RPC oracle solaris Networking Terms
Secure RPC. oracle solaris Networking Terms
SSH
SSH QA testing
SSL
SSL. oracle solaris Networking Terms
SSL IBM
security administrator IBM
SA oracle solaris Networking Terms
SA. oracle solaris Networking Terms
SADB oracle solaris Networking Terms
SADB. oracle solaris Networking Terms
SC QA testing
SMIS QA testing
SPI. oracle solaris Networking Terms
SPD. oracle solaris Networking Terms
sendmail IBM
sense code IBM
SoC ITIL® Service Management
sequential data set IBM
serially reusable IBM
server IBM
server address space IBM
SRVCTL
SMB. oracle solaris Networking Terms
SSI
service IBM
SAC ITIL® Service Management
SAP IBM
SACM ITIL® Service Management
SCM ITIL® Service Management
SDP ITIL® Service Management
SDP QA testing
SFA ITIL® Service Management
SIP ITIL® Service Management
SKMS ITIL® Service Management
SKMS QA testing
service level IBM
SLA
SLA ITIL® Service Management
SLA IBM
SLM ITIL® Service Management
SLP ITIL® Service Management
SLR ITIL® Service Management
SMO ITIL® Service Management
SMF. oracle solaris Networking Terms
SOP
SPM ITIL® Service Management
service processor IBM
service provider IBM
SPI ITIL® Service Management
SPO ITIL® Service Management
SRB IBM
service unit IBM
SOA QA testing
session IBM
session activation request IBM
SDU
session services IBM
severity code IBM
sfp IBM
shared DASD option IBM
shared storage IBM
SP Sharepoint
SCA Sharepoint
SDPS Sharepoint
SPDS Sharepoint
SPF Sharepoint
SPIF Sharepoint
SLK Sharepoint
SPOM Sharepoint
SPPS Sharepoint
SPS Sharepoint
SPSFAQ Sharepoint
SS Sharepoint
SSMM Sharepoint
SPSF Sharepoint
SPSD Sharepoint
STS Sharepoint
shell IBM
side IBM
SIGA IBM
SIGP IBM
SAX
SNMP. oracle solaris Networking Terms
SOAP
spool IBM
single point of control IBM
SPOF ITIL® Service Management
SR-IOV. oracle solaris Networking Terms
SSO
single system image IBM
SI IBM
single-processor complex IBM
single-system sysplex IBM
SLA IBM
SLU IBM
SCSI
SCSI IBM
SMF IBM
SMP/E IBM
SMPCSI IBM
SMS IBM
SMTP IBM
SNA IBM
SNI IBM
SNASw IBM
SNI IBM
SNMP IBM
socket IBM
sofware IBM
SaaS QA testing
SAM ITIL® Service Management
SCR QA testing
SDK QA testing
SDLC QA testing
SDP QA testing
SEI QA testing
SETs QA testing
SLC QA testing
SMARTS QA testing
SQS QA testing
SQSP QA testing
SRR QA testing
STAF QA testing
STL QA testing
STR QA testing
sort/merge program IBM
source code IBM
SCA QA testing
source program IBM
STP. oracle solaris Networking Terms
SMART ITIL® Service Management
spin data set IBM
spoofing IBM
spool IBM
spooled data set IBM
spooling IBM
SPUFI IBM
SQA IBM
SQL IBM
STS
SREL IBM
SRM IBM
SSCH IBM
SSCP IBM
SSCP-dependent LU IBM
SSCP-independent LU IBM
SSCP-LU session IBM
SSCP-SSCP session IBM
ssh IBM
SSID IBM
SSL IBM
stand-alone dump IBM
IEEE 802.1Q oracle solaris Networking Terms
IEEE designation QA testing
SOP ITIL® Service Management
SC QA testing
SG QA testing
star topology IBM
start option IBM
started task IBM
SOR ITIL® Service Management
state-oriented protocol IBM
SCA QA testing
static routing IBM
status-display console IBM
step restart IBM
STI IBM
storage administrator IBM
SAN
storage class IBM
storage group IBM
storage management IBM
SMS IBM
SCTP oracle solaris Networking Terms
SCTP. oracle solaris Networking Terms
string IBM
structure IBM
SA QA testing
SGML
SQL
START QA testing
stub area IBM
subarea IBM
subarea network IBM
subchannel set IBM
subnet IBM
subnetwork IBM
subpool storage IBM
subsystem IBM
SSI IBM
subtask IBM
superuser IBM
superuser authority IBM
supervisor IBM
SVC IBM
SCMIS ITIL® Service Management
SE IBM
suspended state IBM
SVC IBM
SVC dump IBM
SVC interruption IBM
SVC routine IBM
SWA IBM
swap data set IBM
swapping IBM
switch IBM
SMDS IBM
SYN IBM
SYN flood IBM
SDLC IBM
synchronous messages IBM
syncpoint manager IBM
syntax IBM
SYSIN IBM
SYSLIB IBM
SYSLOG IBM
SYSMOD IBM
SYSOUT IBM
SYSOUT class IBM
sysplex IBM
sysplex couple data set IBM
sysplex distributor IBM
Sysplex Timer IBM
SYSRES IBM
system IBM
system abend IBM
SDD QA testing
SAF IBM
system board IBM
SCN
system console IBM
SCE IBM
system data IBM
SDSF IBM
SGA
SIR QA testing
system library IBM
SMF IBM
SYSMOD IBM
SMP/E IBM
system operator IBM
system programmer IBM
SQA IBM
SSCP IBM
STR QA testing
SUT QA testing
STEP QA testing
system-managed data set IBM
system-managed storage IBM
SADT QA testing
SNA IBM
T2.0 IBM
T2.1 IBM
T4 IBM
T5 IBM
TSPITR
tailgate IBM
tape IBM
tape volume IBM
target library IBM
TOE QA testing
target zone IBM
task IBM
TCB IBM
TB IBM
TCB IBM
TCO IBM
TCP IBM
TCP/IP IBM
TDM IBM
TDU IBM
TO ITIL® Service Management
telecommunication line IBM
Telnet IBM
temporary data set IBM
terabyte IBM
terminal IBM
TOR IBM
TOR ITIL® Service Management
TAP QA testing
TCDY QA testing
TCAT QA testing
TEMs QA testing
TDGEN QA testing
TMM QA testing
TPA QA testing
TPI QA testing
TRR QA testing
TTM QA testing
TDD QA testing
TTCN QA testing
TaaS QA testing
TG IBM
TGTLIB IBM
TGV IBM
TH IBM
authentication oracle solaris Networking Terms
payload oracle solaris Networking Terms
IP header oracle solaris Networking Terms
EVS manager oracle solaris Networking Terms
EVS controller oracle solaris Networking Terms
keystore oracle solaris Networking Terms
MAC oracle solaris Networking Terms
key management oracle solaris Networking Terms
IP in IP encapsulation oracle solaris Networking Terms
CAPI Microsof
bandwidth share oracle solaris Networking Terms
keystore name oracle solaris Networking Terms
dial-out machine oracle solaris Networking Terms
dial-in server oracle solaris Networking Terms
flow priority oracle solaris Networking Terms
IPv6 autoconfiguration oracle solaris Networking Terms
repair detection oracle solaris Networking Terms
IPMP oracle solaris Networking Terms
load spreading oracle solaris Networking Terms
router discovery oracle solaris Networking Terms
router solicitation oracle solaris Networking Terms
router advertisement oracle solaris Networking Terms
DefaultFixed NCP oracle solaris Networking Terms
TLS QA testing
3GL IBM
3NF
KLOC QA testing
throughput IBM
tightly coupled IBM
tightly coupled multiprocessing IBM
tightly coupled multiprocessor IBM
TPT QA testing
TSO/E IBM
time-out IBM
TLIB IBM
TLS IBM
TN3270 IBM
TN3270E IBM
token ring network IBM
topology database IBM
TDU IBM
ToS IBM
TCO ITIL® Service Management
TCO IBM
TCU ITIL® Service Management
TQC QA testing
TQM ITIL® Service Management
TP IBM
UML QA testing
track IBM
transaction IBM
XIDs
transistor IBM
transit area IBM
TCP IBM
TCP/IP IBM
TG IBM
TH IBM
transmission line IBM
transmission priority IBM
TAF
TRILL. oracle solaris Networking Terms
TNS
transport layer IBM
TLS IBM
transport protocol IBM
TTCN-1 QA testing
3DES Oracle Solaris Networking Terms
3DES. oracle solaris Networking Terms
TFTP. oracle solaris Networking Terms
TRK IBM
TRL IBM
TRLE IBM
trunk IBM
trunk cable IBM
TCB QA testing
TSO IBM
TSO/E IBM
TSR IBM
twisted pair IBM
TTC
UCB IBM
UCLIN IBM
UDP IBM
UID IBM
UIM IBM
UC ITIL® Service Management
Unicode IBM
UML QA testing
URI
URI QA testing
URI. oracle solaris Networking Terms
URL
URL QA testing
UP IBM
UID
UDF QA testing
UR IBM
UDDI
UDDI QA testing
UNC
UNIX file system IBM
UNIX operating system IBM
UUCP. oracle solaris Networking Terms
unload IBM
UNLOAD command IBM
unused cable IBM
UCL QA testing
upwardly compatible IBM
URG IBM
UTC QA testing
DMVs Microsof
Flat network oracle solaris Networking Terms
user abend IBM
user catalog IBM
UDP. oracle solaris Networking Terms
UDP IBM
user exit IBM
user ID IBM
user ID IBM
UIX
USERMOD IBM
UP ITIL® Service Management
USM QA testing
USERMOD IBM
CTE Microsof
CSOM Microsof
UTP IBM
V=R region IBM
V=V region IBM
VOI ITIL® Service Management
variable-length record IBM
VB IBM
vendor IBM
V&V QA testing
version IBM
VIO IBM
VIPA IBM
virtual address space IBM
VE QA testing
VXLAN. oracle solaris Networking Terms
VF. oracle solaris Networking Terms
VIO IBM
VRIP. oracle solaris Networking Terms
VIPA IBM
VLAN device. oracle solaris Networking Terms
VLAN. oracle solaris Networking Terms
VNC QA testing
VNI. oracle solaris Networking Terms
VNIC. oracle solaris Networking Terms
VPN. oracle solaris Networking Terms
VPN IBM
VR IBM
VRID. oracle solaris Networking Terms
VRRP. oracle solaris Networking Terms
VSI. oracle solaris Networking Terms
virtual storage IBM
VSAM IBM
VTAM IBM
VIT IBM
VBF ITIL® Service Management
VLAN IBM
VM IBM
VOLSER IBM
volume IBM
volume backup IBM
volume serial number IBM
VSS
VTOC IBM
VPN IBM
VR IBM
VRN IBM
VSAM IBM
VDP. oracle solaris Networking Terms
VTAM IBM
VTOC IBM
also VNI. oracle solaris Networking Terms
wait state IBM
waiting time IBM
WAN IBM
WAP IBM
WCC IBM
WSDL
WebSphere Application Server IBM
WebSphere MQ IBM
WebSphere® IBM
well-known port IBM
DISM Microsof
DMS Microsof
WAN IBM
Wi-Fi IBM
wild carding IBM
AIK
ADAL
AAD RM
WEP key. oracle solaris Networking Terms
WAP. oracle solaris Networking Terms
WLM IBM
WIP ITIL® Service Management
work request IBM
WG
workload IBM
WLM IBM
W3C
WebDAV
wrap mode IBM
WTO IBM
WTOR IBM
WSF IBM
WTO IBM
WTOR IBM
xa IBM
XCA IBM
XCF IBM
XID IBM
XQuery
XSU
XVM
z/Architecture IBM
z/OS IBM
z/OS Language Environment IBM
z/OS UNIX IBM
zAAP IBM
zFS IBM
zSeries IBM
zAAP IBM
zFS IBM
IPnet oracle solaris Networking Terms
public key cryptography oracle solaris Networking Terms
link-local address oracle solaris Networking Terms
digital signature oracle solaris Networking Terms
reflective relay oracle solaris Networking Terms
packet filter oracle solaris Networking Terms
asynchronous PPP oracle solaris Networking Terms
packet oracle solaris Networking Terms
anycast group oracle solaris Networking Terms
EVS node oracle solaris Networking Terms
InfiniBand oracle solaris Networking Terms
hop oracle solaris Networking Terms
RSA oracle solaris Networking Terms
link aggregation oracle solaris Networking Terms
extended accounting oracle solaris Networking Terms
network accounting oracle solaris Networking Terms
marker oracle solaris Networking Terms
meter oracle solaris Networking Terms
replay attack oracle solaris Networking Terms
fixed network configuration mode oracle solaris Networking Terms
reactive network configuration mode oracle solaris Networking Terms
host oracle solaris Networking Terms
multicast oracle solaris Networking Terms
ICMP echo request packet oracle solaris Networking Terms
promiscuous trunk port oracle solaris Networking Terms
PVLAN secondary trunk port oracle solaris Networking Terms
leased-line PPP link oracle solaris Networking Terms
dial-up PPP link oracle solaris Networking Terms
flow accounting oracle solaris Networking Terms
neighbor advertisement oracle solaris Networking Terms
expect-send oracle solaris Networking Terms
filter oracle solaris Networking Terms
autonomous system oracle solaris Networking Terms
neighbor solicitation oracle solaris Networking Terms
secondary VLAN oracle solaris Networking Terms
Blowfish oracle solaris Networking Terms
multihomed host oracle solaris Networking Terms
router oracle solaris Networking Terms
Ethernet oracle solaris Networking Terms
physical interface oracle solaris Networking Terms
routing table oracle solaris Networking Terms
dual stack oracle solaris Networking Terms
bidirectional tunnel oracle solaris Networking Terms
dynamic routing oracle solaris Networking Terms
community VLAN oracle solaris Networking Terms
isolated VLAN oracle solaris Networking Terms
IPoIB VNICs oracle solaris Networking Terms
local-use address oracle solaris Networking Terms
etherstub oracle solaris Networking Terms
private virtual network oracle solaris Networking Terms
anet resource oracle solaris Networking Terms
backup router oracle solaris Networking Terms
master router oracle solaris Networking Terms
CHAP secret oracle solaris Networking Terms
Diffie-Hellman protocol oracle solaris Networking Terms
denial of service attack oracle solaris Networking Terms
6to4 oracle solaris Networking Terms
asymmetric key cryptography oracle solaris Networking Terms
PV NIC oracle solaris Networking Terms
autonegotiation oracle solaris Networking Terms
EVS client oracle solaris Networking Terms
authentication header oracle solaris Networking Terms
proxy server oracle solaris Networking Terms
diffserv model oracle solaris Networking Terms
data address oracle solaris Networking Terms
DEPRECATED address oracle solaris Networking Terms
private address oracle solaris Networking Terms
neighbor discovery oracle solaris Networking Terms
IPMP group oracle solaris Networking Terms
IPv4 broadcast address oracle solaris Networking Terms
multicast address oracle solaris Networking Terms
anycast address oracle solaris Networking Terms
minimal encapsulation oracle solaris Networking Terms
AC oracle sun b2b suite ebxml Protocol Manager
AD, *AD, xAD oracle sun b2b suite ebxml Protocol Manager
AS2 oracle sun b2b suite ebxml Protocol Manager
ASO oracle sun b2b suite ebxml Protocol Manager
B2B oracle sun b2b suite ebxml Protocol Manager
BAD oracle sun b2b suite ebxml Protocol Manager
BI oracle sun b2b suite ebxml Protocol Manager
BPAD oracle sun b2b suite ebxml Protocol Manager
CAPS oracle sun b2b suite ebxml Protocol Manager
CDT oracle sun b2b suite ebxml Protocol Manager
CIDX oracle sun b2b suite ebxml Protocol Manager
CM oracle sun b2b suite ebxml Protocol Manager
DB oracle sun b2b suite ebxml Protocol Manager
DPAD oracle sun b2b suite ebxml Protocol Manager
DT oracle sun b2b suite ebxml Protocol Manager
EAD oracle sun b2b suite ebxml Protocol Manager
ebXML oracle sun b2b suite ebxml Protocol Manager
ePM oracle sun b2b suite ebxml Protocol Manager
FTP oracle sun b2b suite ebxml Protocol Manager
HTTP oracle sun b2b suite ebxml Protocol Manager
ICAN oracle sun b2b suite ebxml Protocol Manager
LDAP oracle sun b2b suite ebxml Protocol Manager
MAD oracle sun b2b suite ebxml Protocol Manager
MBA oracle sun b2b suite ebxml Protocol Manager
MDS oracle sun b2b suite ebxml Protocol Manager
MIME oracle sun b2b suite ebxml Protocol Manager
ORASE oracle sun b2b suite ebxml Protocol Manager
OTD oracle sun b2b suite ebxml Protocol Manager
PAD oracle sun b2b suite ebxml Protocol Manager
RA oracle sun b2b suite ebxml Protocol Manager
RADM oracle sun b2b suite ebxml Protocol Manager
RDF oracle sun b2b suite ebxml Protocol Manager
RNIF oracle sun b2b suite ebxml Protocol Manager
S/MIME oracle sun b2b suite ebxml Protocol Manager
SME oracle sun b2b suite ebxml Protocol Manager
SMTP oracle sun b2b suite ebxml Protocol Manager
TAD oracle sun b2b suite ebxml Protocol Manager
TCP/IP oracle sun b2b suite ebxml Protocol Manager
TP, TPP oracle sun b2b suite ebxml Protocol Manager
UI oracle sun b2b suite ebxml Protocol Manager
URL oracle sun b2b suite ebxml Protocol Manager
XML oracle sun b2b suite ebxml Protocol Manager
selector oracle solaris Networking Terms
sendmail oracle solaris Networking Terms
SHA-1 oracle solaris Networking Terms
SHA-2 oracle solaris Networking Terms
SMB oracle solaris Networking Terms
SMF oracle solaris Networking Terms
smurf attack oracle solaris Networking Terms
sniff oracle solaris Networking Terms
SNMP oracle solaris Networking Terms
SPD oracle solaris Networking Terms
SPI oracle solaris Networking Terms
spoof oracle solaris Networking Terms
SR-IOV oracle solaris Networking Terms
SSL oracle solaris Networking Terms
SSL kernel proxy oracle solaris Networking Terms
standby interface oracle solaris Networking Terms
stateful packet filter oracle solaris Networking Terms
stateless autoconfiguration oracle solaris Networking Terms
static routing oracle solaris Networking Terms
STP oracle solaris Networking Terms
subnet oracle solaris Networking Terms
symmetric key cryptography oracle solaris Networking Terms
synchronous PPP oracle solaris Networking Terms
tenant oracle solaris Networking Terms
test address oracle solaris Networking Terms
TFTP oracle solaris Networking Terms
TRILL oracle solaris Networking Terms
trunk aggregation oracle solaris Networking Terms
trusted callers oracle solaris Networking Terms
UDP oracle solaris Networking Terms
unicast address oracle solaris Networking Terms
uniform resource locator oracle solaris Networking Terms
uplink port oracle solaris Networking Terms
URI oracle solaris Networking Terms
URL oracle solaris Networking Terms
user-priority oracle solaris Networking Terms
UUCP oracle solaris Networking Terms
VDP oracle solaris Networking Terms
VF oracle solaris Networking Terms
virtual network oracle solaris Networking Terms
virtual port oracle solaris Networking Terms
virtual switch oracle solaris Networking Terms
VLAN oracle solaris Networking Terms
VLAN device oracle solaris Networking Terms
VNI oracle solaris Networking Terms
VNIC oracle solaris Networking Terms
VPN oracle solaris Networking Terms
VRID oracle solaris Networking Terms
VRIP oracle solaris Networking Terms
VRRP oracle solaris Networking Terms
VSI oracle solaris Networking Terms
VXLAN oracle solaris Networking Terms
WAP oracle solaris Networking Terms
WEP key oracle solaris Networking Terms
acceptance criteria QA testing
acceptance testing QA testing
accessibility testing QA testing
accuracy QA testing
actual result QA testing
ad hoc testing QA testing
adaptability QA testing
agile testing QA testing
alpha testing QA testing
analyzability QA testing
anomaly QA testing
attractiveness QA testing
audit QA testing
automated testware QA testing
availability QA testing
back-to-back testing QA testing
baseline QA testing
basic block QA testing
basis test set QA testing
behavior QA testing
benchmark test QA testing
bespoke sofware QA testing
best practice QA testing
beta testing QA testing
big-bang testing QA testing
black box test design techniques QA testing
black box testing QA testing
blocked test case QA testing
bottom-up testing QA testing
boundary value analysis QA testing
boundary value coverage QA testing
boundary value QA testing
branch coverage QA testing
branch testing QA testing
branch QA testing
business process-based testing QA testing
Capability Maturity Model (CMM) QA testing
Capability Maturity Model Integration QA testing
capture/playback tool QA testing
CASE QA testing
CAST QA testing
cause-effect graph QA testing
cause-effect graphing QA testing
certification QA testing
changeability QA testing
classification tree method QA testing
code coverage QA testing
co-existence QA testing
complexity QA testing
compliance testing QA testing
compliance QA testing
component integration testing QA testing
component specification QA testing
component testing QA testing
component QA testing
compound condition QA testing
concurrency testing QA testing
condition coverage QA testing
condition determination coverage QA testing
condition determination testing QA testing
condition outcome QA testing
condition testing QA testing
condition QA testing
configuration auditing QA testing
configuration control QA testing
configuration identification QA testing
configuration item QA testing
configuration management QA testing
configuration QA testing
consistency QA testing
control flow QA testing
conversion testing QA testing
COTS QA testing
coverage analysis QA testing
coverage item QA testing
coverage tool QA testing
coverage QA testing
cyclomatic complexity QA testing
data definition QA testing
data driven testing QA testing
data flow analysis QA testing
data flow coverage QA testing
data flow test QA testing
data flow QA testing
debugging tool QA testing
debugging QA testing
decision condition coverage QA testing
decision condition testing QA testing
decision coverage QA testing
decision outcome QA testing
decision table testing QA testing
decision table QA testing
decision testing QA testing
decision QA testing
defect density QA testing
Defect Detection Percentage (DDP) QA testing
defect management QA testing
defect masking QA testing
defect report QA testing
defect QA testing
definition-use pair QA testing
deliverable QA testing
design-based testing QA testing
desk checking QA testing
development testing QA testing
documentation testing QA testing
domain QA testing
driver QA testing
dynamic analysis QA testing
dynamic comparison QA testing
dynamic testing QA testing
efficiency testing QA testing
efficiency QA testing
elementary comparison testing QA testing
emulator QA testing
entry criteria QA testing
entry point QA testing
equivalence partition coverage QA testing
equivalence partition QA testing
equivalence partitioning QA testing
error guessing QA testing
error seeding QA testing
error tolerance QA testing
error QA testing
exception handling QA testing
executable statement QA testing
exercised QA testing
exhaustive testing QA testing
exit criteria QA testing
exit point QA testing
expected result QA testing
exploratory testing QA testing
fail QA testing
Failure Mode and Effect Analysis (FMEAQA testing
failure mode QA testing
failure rate QA testing
failure QA testing
fault tolerance QA testing
fault tree analysis QA testing
feasible path QA testing
feature QA testing
finite state machine QA testing
formal review QA testing
frozen test basis QA testing
Function Point Analysis (FPA) QA testing
functional integration QA testing
functional requirement QA testing
functional test design technique QA testing
functional testing QA testing
functionality testing QA testing
functionality QA testing
glass box testing QA testing
heuristic evaluation QA testing
high level test case QA testing
horizontal traceability QA testing
impact analysis QA testing
incident management tool QA testing
incident management QA testing
incident report QA testing
incident QA testing
incremental development model QA testing
incremental testing QA testing
independence QA testing
infeasible path QA testing
informal review QA testing
input domain QA testing
input value QA testing
input QA testing
inspection QA testing
installability testing QA testing
installability QA testing
installation guide QA testing
installation wizard QA testing
instrumentation QA testing
instrumenter QA testing
intake test QA testing
integration testing QA testing
integration QA testing
interface testing QA testing
interoperability testing QA testing
interoperability QA testing
invalid testing QA testing
isolation testing QA testing
keyword driven testing QA testing
LCSAJ coverage QA testing
LCSAJ testing QA testing
LCSAJ QA testing
learnability QA testing
load test QA testing
low level test case QA testing
maintainability testing QA testing
maintainability QA testing
maintenance testing QA testing
maintenance QA testing
management review QA testing
maturity QA testing
measure QA testing
measurement scale QA testing
measurement QA testing
memory leak QA testing
metric QA testing
milestone QA testing
moderator QA testing
monitor QA testing
multiple condition coverage QA testing
multiple condition testing QA testing
mutation analysis QA testing
negative testing QA testing
non-conformity QA testing
non-functional requirement QA testing
non-functional test design techniques QA testing
non-functional testing QA testing
N-switch coverage QA testing
N-switch testing QA testing
off-the-shelf sofware QA testing
operability QA testing
operational environment QA testing
operational profile testing QA testing
operational testing QA testing
output domain QA testing
output value QA testing
output QA testing
pair programming QA testing
pair testing QA testing
pass/fail criteria QA testing
Pass QA testing
path coverage QA testing
path sensitizing QA testing
path testing QA testing
path QA testing
performance indicator QA testing
performance testing tool QA testing
performance testing QA testing
performance QA testing
phase test plan QA testing
portability testing QA testing
portability QA testing
postcondition QA testing
post-execution comparison QA testing
precondition QA testing
Priority QA testing
process cycle test QA testing
process QA testing
project test plan QA testing
project QA testing
pseudo-random QA testing
quality assurance QA testing
quality attribute QA testing
quality management QA testing
quality QA testing
random testing QA testing
recoverability testing QA testing
recoverability QA testing
regression testing QA testing
release note QA testing
reliability testing QA testing
reliability QA testing
replaceability QA testing
requirement QA testing
requirements management tool QA testing
requirements phase QA testing
requirements-based testing QA testing
resource utilization testing QA testing
resource utilization QA testing
result QA testing
resumption criteria QA testing
re-testing QA testing
review QA testing
reviewer QA testing
risk analysis QA testing
risk control QA testing
risk identification QA testing
risk management QA testing
risk QA testing
risk-based testing QA testing
robustness QA testing
root cause QA testing
safety testing QA testing
safety QA testing
scalability testing QA testing
scalability QA testing
scribe QA testing
scripting language QA testing
security testing QA testing
security QA testing
severity QA testing
simulation QA testing
simulator QA testing
smoke test QA testing
sofware quality QA testing
Sofware Usability Measurement InventQA testing
specification QA testing
specification-based test design techniq QA testing
specified input QA testing
stability QA testing
state diagram QA testing
state table QA testing
state transition testing QA testing
state transition QA testing
statement coverage QA testing
statement testing QA testing
statement QA testing
static analysis QA testing
static analyzer QA testing
static code analysis QA testing
static code analyzer QA testing
static testing QA testing
statistical testing QA testing
status accounting QA testing
Stress testing QA testing
structural coverage QA testing
structural test design technique QA testing
stub QA testing
subpath QA testing
suitability QA testing
suspension criteria QA testing
syntax testing QA testing
system integration testing QA testing
system testing QA testing
system QA testing
technical review QA testing
test approach QA testing
test automation QA testing
test basis QA testing
test case specification QA testing
test case QA testing
test charter QA testing
test comparator QA testing
test comparison QA testing
test condition QA testing
test data preparation tool QA testing
test data QA testing
test design specification QA testing
test design technique QA testing
test design tool QA testing
test environment QA testing
test evaluation report QA testing
test execution automation QA testing
test execution phase QA testing
test execution schedule QA testing
test execution technique QA testing
test execution tool QA testing
test execution QA testing
test harness QA testing
test infrastructure QA testing
test item QA testing
test level QA testing
test log QA testing
test logging QA testing
test management QA testing
test manager QA testing
Test Maturity Model (TMM) QA testing
test object QA testing
test objective QA testing
test oracle QA testing
test performance indicator QA testing
test phase QA testing
test plan QA testing
test planning QA testing
test point analysis (TPA) QA testing
test policy QA testing
test procedure specification QA testing
test procedure QA testing
Test Process Improvement (TPI) QA testing
test process QA testing
test repeatability QA testing
test run QA testing
test script QA testing
test specification QA testing
test strategy QA testing
test suite QA testing
test summary report QA testing
test target QA testing
test tool QA testing
test type QA testing
testability review QA testing
testability QA testing
testable requirements QA testing
tester QA testing
testing QA testing
testware QA testing
thread testing QA testing
top-down testing QA testing
traceability QA testing
udit trail QA testing
understandability QA testing
unreachable code QA testing
usability testing QA testing
usability QA testing
use case testing QA testing
user test QA testing
validation QA testing
variable QA testing
verification QA testing
vertical traceability QA testing
V-model QA testing
volume testing QA testing
walkthrough QA testing
white box test design technique QA testing
white box testing QA testing
Wide Band Delphi QA testing
acceptance ITIL® Service Management
access management ITIL® Service Management
account manager ITIL® Service Management
accounting ITIL® Service Management
accredited ITIL® Service Management
active monitoring ITIL® Service Management
activity ITIL® Service Management
agreed service time ITIL® Service Management
agreement ITIL® Service Management
alert ITIL® Service Management
analytical modelling ITIL® Service Management
application ITIL® Service Management
application management ITIL® Service Management
application portolio ITIL® Service Management
application service provider ITIL® Service Management
application sizing ITIL® Service Management
architecture ITIL® Service Management
assembly ITIL® Service Management
assessment ITIL® Service Management
asset ITIL® Service Management
asset management ITIL® Service Management
asset register ITIL® Service Management
asset specificity ITIL® Service Management
attribute ITIL® Service Management
audit ITIL® Service Management
authority matrix ITIL® Service Management
automatic call distribution ITIL® Service Management
availability ITIL® Service Management
availability management ITIL® Service Management
availability management information s ITIL® Service Management
availability plan ITIL® Service Management
back-out ITIL® Service Management
backup ITIL® Service Management
balanced scorecard ITIL® Service Management
baseline ITIL® Service Management
benchmark ITIL® Service Management
benchmarking ITIL® Service Management
best practice ITIL® Service Management
brainstorming ITIL® Service Management
British Standards Institution ITIL® Service Management
budget ITIL® Service Management
budgeting ITIL® Service Management
build ITIL® Service Management
build environment ITIL® Service Management
business ITIL® Service Management
business capacity management ITIL® Service Management
business case ITIL® Service Management
business continuity management ITIL® Service Management
business continuity plan ITIL® Service Management
business customer ITIL® Service Management
business impact analysis ITIL® Service Management
business objective ITIL® Service Management
business operations ITIL® Service Management
business perspective ITIL® Service Management
business process ITIL® Service Management
business relationship management ITIL® Service Management
business relationship manager ITIL® Service Management
business service ITIL® Service Management
business service management ITIL® Service Management
business unit ITIL® Service Management
call ITIL® Service Management
call centre ITIL® Service Management
call type ITIL® Service Management
capability ITIL® Service Management
capability maturity model integration ITIL® Service Management
capacity ITIL® Service Management
capacity management ITIL® Service Management
capacity management information syst ITIL® Service Management
capacity plan ITIL® Service Management
capacity planning ITIL® Service Management
capital expenditure ITIL® Service Management
capital item ITIL® Service Management
capitalization ITIL® Service Management
category ITIL® Service Management
certification ITIL® Service Management
change ITIL® Service Management
Change Advisory Board ITIL® Service Management
change evaluation ITIL® Service Management
change history ITIL® Service Management
change management ITIL® Service Management
change model ITIL® Service Management
change proposal ITIL® Service Management
change record ITIL® Service Management
change request ITIL® Service Management
change schedule ITIL® Service Management
change window ITIL® Service Management
charging ITIL® Service Management
charter ITIL® Service Management
chronological analysis ITIL® Service Management
CI type ITIL® Service Management
classification ITIL® Service Management
client ITIL® Service Management
closed ITIL® Service Management
closure ITIL® Service Management
COBIT ITIL® Service Management
code of practice ITIL® Service Management
cold standby ITIL® Service Management
commercial off the shelf ITIL® Service Management
compliance ITIL® Service Management
component ITIL® Service Management
component capacity management ITIL® Service Management
component configuration item ITIL® Service Management
component failure impact analysis ITIL® Service Management
computer telephony integration ITIL® Service Management
concurrency ITIL® Service Management
confidentiality ITIL® Service Management
configuration ITIL® Service Management
configuration baseline ITIL® Service Management
configuration control ITIL® Service Management
configuration identification ITIL® Service Management
configuration item ITIL® Service Management
configuration management ITIL® Service Management
configuration management database ITIL® Service Management
configuration management system ITIL® Service Management
configuration record ITIL® Service Management
configuration structure ITIL® Service Management
continual service improvement ITIL® Service Management
continuous availability ITIL® Service Management
continuous operation ITIL® Service Management
contract ITIL® Service Management
control ITIL® Service Management
Control OBjectives for Information and ITIL® Service Management
control perspective ITIL® Service Management
control processes ITIL® Service Management
core service ITIL® Service Management
core service package ITIL® Service Management
cost ITIL® Service Management
cost benefit analysis ITIL® Service Management
cost centre ITIL® Service Management
cost element ITIL® Service Management
cost management ITIL® Service Management
cost type ITIL® Service Management
cost unit ITIL® Service Management
cost-effectiveness ITIL® Service Management
countermeasure ITIL® Service Management
course corrections ITIL® Service Management
CRAMM ITIL® Service Management
crisis management ITIL® Service Management
critical success factor ITIL® Service Management
CSI register ITIL® Service Management
culture ITIL® Service Management
customer ITIL® Service Management
customer agreement portolio ITIL® Service Management
customer-facing service ITIL® Service Management
customer portolio ITIL® Service Management
dashboard ITIL® Service Management
Data-to-Information-to-Knowledge-to ITIL® Service Management
definitive media library ITIL® Service Management
deliverable ITIL® Service Management
demand management ITIL® Service Management
Deming Cycle ITIL® Service Management
dependency ITIL® Service Management
deployment ITIL® Service Management
depreciation ITIL® Service Management
design ITIL® Service Management
design coordination ITIL® Service Management
detection ITIL® Service Management
development ITIL® Service Management
development environment ITIL® Service Management
diagnosis ITIL® Service Management
diagnostic script ITIL® Service Management
differential charging ITIL® Service Management
direct cost ITIL® Service Management
directory service ITIL® Service Management
document ITIL® Service Management
downtime ITIL® Service Management
driver ITIL® Service Management
early life support ITIL® Service Management
economies of scale ITIL® Service Management
economies of scope ITIL® Service Management
effectiveness ITIL® Service Management
efficiency ITIL® Service Management
emergency change ITIL® Service Management
Emergency Change Advisory Board ITIL® Service Management
environment ITIL® Service Management
error ITIL® Service Management
escalation ITIL® Service Management
e-sourcing capability model for client o ITIL® Service Management
e-sourcing capability model for service ITIL® Service Management
estimation ITIL® Service Management
event ITIL® Service Management
event management ITIL® Service Management
exception report ITIL® Service Management
expanded incident lifecycle ITIL® Service Management
external customer ITIL® Service Management
external metric ITIL® Service Management
external service provider ITIL® Service Management
outsourcing ITIL® Service Management
facilities management ITIL® Service Management
failure ITIL® Service Management
failure modes and effects analysis ITIL® Service Management
fast recovery ITIL® Service Management
fault ITIL® Service Management
fault tolerance ITIL® Service Management
fault tree analysis ITIL® Service Management
financial management ITIL® Service Management
first line support ITIL® Service Management
fishbone diagram ITIL® Service Management
fit for purpose ITIL® Service Management
fixed asset ITIL® Service Management
fixed asset management ITIL® Service Management
fixed cost ITIL® Service Management
fixed facility ITIL® Service Management
follow the sun ITIL® Service Management
fulfilment ITIL® Service Management
function ITIL® Service Management
functional escalation ITIL® Service Management
gap analysis ITIL® Service Management
governance ITIL® Service Management
gradual recovery ITIL® Service Management
guideline ITIL® Service Management
help desk ITIL® Service Management
hierarchic escalation ITIL® Service Management
high availability ITIL® Service Management
hot standby ITIL® Service Management
identity ITIL® Service Management
immediate recovery ITIL® Service Management
impact ITIL® Service Management
incident ITIL® Service Management
incident management ITIL® Service Management
incident record ITIL® Service Management
indirect cost ITIL® Service Management
information security management ITIL® Service Management
information security management syst ITIL® Service Management
information security policy ITIL® Service Management
information technology ITIL® Service Management
infrastructure service ITIL® Service Management
in-sourcing ITIL® Service Management
integrity ITIL® Service Management
interactive voice response ITIL® Service Management
intermediate recovery ITIL® Service Management
internal customer ITIL® Service Management
internal metric ITIL® Service Management
internal rate of return ITIL® Service Management
internal service provider ITIL® Service Management
insourcing ITIL® Service Management
International Organization for StandardiITIL® Service Management
International Standards Organization ITIL® Service Management
internet service provider ITIL® Service Management
invocation ITIL® Service Management
Ishikawa diagram ITIL® Service Management
ISO 9000 ITIL® Service Management
ISO 9001 ITIL® Service Management
ISO/IEC 17799 ITIL® Service Management
ISO/IEC 20000 ITIL® Service Management
ISO/IEC 27001 ITIL® Service Management
IT directorate ITIL® Service Management
IT infrastructure ITIL® Service Management
ITIL ITIL® Service Management
IT operations ITIL® Service Management
IT operations control ITIL® Service Management
IT operations management ITIL® Service Management
IT service ITIL® Service Management
IT service continuity management ITIL® Service Management
IT service continuity plan ITIL® Service Management
IT service management ITIL® Service Management
IT Service Management Forum ITIL® Service Management
IT service provider ITIL® Service Management
IT Steering Group ITIL® Service Management
job description ITIL® Service Management
job scheduling ITIL® Service Management
Kano model ITIL® Service Management
Kepner and Tregoe analysis ITIL® Service Management
key performance indicator ITIL® Service Management
knowledge base ITIL® Service Management
knowledge management ITIL® Service Management
known error ITIL® Service Management
known error database ITIL® Service Management
known error record ITIL® Service Management
lifecycle ITIL® Service Management
line of service ITIL® Service Management
live ITIL® Service Management
live environment ITIL® Service Management
manageability ITIL® Service Management
maintainability ITIL® Service Management
major incident ITIL® Service Management
managed services ITIL® Service Management
management information ITIL® Service Management
management of risk ITIL® Service Management
management system ITIL® Service Management
manual workaround ITIL® Service Management
marginal cost ITIL® Service Management
market space ITIL® Service Management
maturity ITIL® Service Management
maturity level ITIL® Service Management
mean time between failures ITIL® Service Management
mean time between service incidents ITIL® Service Management
mean time to repair ITIL® Service Management
mean time to restore service ITIL® Service Management
metric ITIL® Service Management
middleware ITIL® Service Management
mission statement ITIL® Service Management
model ITIL® Service Management
modelling ITIL® Service Management
monitor control loop ITIL® Service Management
monitoring ITIL® Service Management
near-shore ITIL® Service Management
net present value ITIL® Service Management
normal change ITIL® Service Management
normal service operation ITIL® Service Management
notional charging ITIL® Service Management
Objective ITIL® Service Management
off the shelf ITIL® Service Management
Office of Government Commerce ITIL® Service Management
off-shore ITIL® Service Management
on-shore ITIL® Service Management
operate ITIL® Service Management
operation ITIL® Service Management
operational ITIL® Service Management
operational cost ITIL® Service Management
operational expenditure ITIL® Service Management
operational level agreement ITIL® Service Management
operations bridge ITIL® Service Management
operations control ITIL® Service Management
operations management ITIL® Service Management
opportunity cost ITIL® Service Management
optimize ITIL® Service Management
organization ITIL® Service Management
outcome ITIL® Service Management
outsourcing ITIL® Service Management
overhead ITIL® Service Management
pain value analysis ITIL® Service Management
pareto principle ITIL® Service Management
partnership ITIL® Service Management
passive monitoring ITIL® Service Management
pattern of business activity ITIL® Service Management
percentage utilization ITIL® Service Management
performance ITIL® Service Management
performance anatomy ITIL® Service Management
performance management ITIL® Service Management
pilot ITIL® Service Management
plan ITIL® Service Management
Plan–Do–Check–Act ITIL® Service Management
planned downtime ITIL® Service Management
planning ITIL® Service Management
policy ITIL® Service Management
portable facility ITIL® Service Management
post-implementation review ITIL® Service Management
practice ITIL® Service Management
prerequisite for success ITIL® Service Management
pricing ITIL® Service Management
PRINCE2 ITIL® Service Management
priority ITIL® Service Management
proactive monitoring ITIL® Service Management
proactive problem management ITIL® Service Management
problem ITIL® Service Management
problem management ITIL® Service Management
problem record ITIL® Service Management
procedure ITIL® Service Management
process ITIL® Service Management
process control ITIL® Service Management
process manager ITIL® Service Management
process owner ITIL® Service Management
production environment ITIL® Service Management
profit centre ITIL® Service Management
pro-forma ITIL® Service Management
program ITIL® Service Management
project ITIL® Service Management
Project Management Body of KnowledgITIL® Service Management
projected service outage ITIL® Service Management
PRojects IN Controlled Environments ITIL® Service Management
qualification ITIL® Service Management
quality ITIL® Service Management
quality assurance ITIL® Service Management
quality management system ITIL® Service Management
quick win ITIL® Service Management
RACI ITIL® Service Management
reactive monitoring ITIL® Service Management
reciprocal arrangement ITIL® Service Management
record ITIL® Service Management
recovery ITIL® Service Management
recovery option ITIL® Service Management
recovery point objective ITIL® Service Management
recovery time objective ITIL® Service Management
redundancy ITIL® Service Management
relationship ITIL® Service Management
relationship processes ITIL® Service Management
release ITIL® Service Management
release and deployment management ITIL® Service Management
release identification ITIL® Service Management
release management ITIL® Service Management
request model ITIL® Service Management
release package ITIL® Service Management
release process ITIL® Service Management
release record ITIL® Service Management
release unit ITIL® Service Management
release window ITIL® Service Management
reliability ITIL® Service Management
remediation ITIL® Service Management
repair ITIL® Service Management
request for change ITIL® Service Management
request fulfilment ITIL® Service Management
requirement ITIL® Service Management
resilience ITIL® Service Management
resolution ITIL® Service Management
resolution processes ITIL® Service Management
resource ITIL® Service Management
response time ITIL® Service Management
responsiveness ITIL® Service Management
restoration of service ITIL® Service Management
restore ITIL® Service Management
retire ITIL® Service Management
return on assets ITIL® Service Management
return on investment ITIL® Service Management
return to normal ITIL® Service Management
review ITIL® Service Management
rights ITIL® Service Management
risk ITIL® Service Management
risk assessment ITIL® Service Management
risk management ITIL® Service Management
role ITIL® Service Management
root cause ITIL® Service Management
root cause analysis ITIL® Service Management
running costs ITIL® Service Management
Term ITIL® Service Management
scalability ITIL® Service Management
scope ITIL® Service Management
second line support ITIL® Service Management
security ITIL® Service Management
security management ITIL® Service Management
security management information syst ITIL® Service Management
security policy ITIL® Service Management
separation of concerns ITIL® Service Management
server ITIL® Service Management
service ITIL® Service Management
service acceptance criteria ITIL® Service Management
service analytics ITIL® Service Management
service asset ITIL® Service Management
service asset and configuration manag ITIL® Service Management
service capacity management ITIL® Service Management
service catalogueue ITIL® Service Management
service change ITIL® Service Management
service charter ITIL® Service Management
service continuity management ITIL® Service Management
service contract ITIL® Service Management
service culture ITIL® Service Management
service design ITIL® Service Management
service design package ITIL® Service Management
service desk ITIL® Service Management
service failure analysis ITIL® Service Management
service hours ITIL® Service Management
service improvement plan ITIL® Service Management
service knowledge management syste ITIL® Service Management
service level ITIL® Service Management
service level agreement ITIL® Service Management
service level management ITIL® Service Management
service level package ITIL® Service Management
service level requirement ITIL® Service Management
service level target ITIL® Service Management
service lifecycle ITIL® Service Management
service maintenance objective ITIL® Service Management
service management ITIL® Service Management
service management lifecycle ITIL® Service Management
service manager ITIL® Service Management
service model ITIL® Service Management
service operation ITIL® Service Management
service owner ITIL® Service Management
service package ITIL® Service Management
service pipeline ITIL® Service Management
service portolio ITIL® Service Management
service portolio management ITIL® Service Management
service potential ITIL® Service Management
service provider ITIL® Service Management
service provider interface ITIL® Service Management
service provisioning optimization ITIL® Service Management
service reporting ITIL® Service Management
service request ITIL® Service Management
service sourcing ITIL® Service Management
service strategy ITIL® Service Management
service transition ITIL® Service Management
service validation and testing ITIL® Service Management
service valuation ITIL® Service Management
serviceability ITIL® Service Management
seven-step improvement process ITIL® Service Management
shif ITIL® Service Management
simulation modelling ITIL® Service Management
single point of contact ITIL® Service Management
single point of failure ITIL® Service Management
SLAM chart ITIL® Service Management
SMART ITIL® Service Management
snapshot ITIL® Service Management
sofware asset management ITIL® Service Management
source ITIL® Service Management
specification ITIL® Service Management
stakeholder ITIL® Service Management
standard ITIL® Service Management
standard change ITIL® Service Management
standard operating procedures ITIL® Service Management
standby ITIL® Service Management
statement of requirements ITIL® Service Management
status ITIL® Service Management
status accounting ITIL® Service Management
storage management ITIL® Service Management
strategic ITIL® Service Management
strategy ITIL® Service Management
strategy management ITIL® Service Management
super user ITIL® Service Management
supplier ITIL® Service Management
supplier and contract management inf ITIL® Service Management
supplier management ITIL® Service Management
supply chain ITIL® Service Management
support group ITIL® Service Management
support hours ITIL® Service Management
supporting service ITIL® Service Management
SWOT analysis ITIL® Service Management
system ITIL® Service Management
system management ITIL® Service Management
tactical ITIL® Service Management
tag ITIL® Service Management
technical management ITIL® Service Management
technical observation post ITIL® Service Management
technical support ITIL® Service Management
tension metrics ITIL® Service Management
terms of reference ITIL® Service Management
test ITIL® Service Management
test environment ITIL® Service Management
third party ITIL® Service Management
third line support ITIL® Service Management
threat ITIL® Service Management
threshold ITIL® Service Management
throughput ITIL® Service Management
total cost of ownership ITIL® Service Management
total cost of utilization ITIL® Service Management
total quality management ITIL® Service Management
transaction ITIL® Service Management
transition ITIL® Service Management
transition planning and support ITIL® Service Management
trend analysis ITIL® Service Management
tuning ITIL® Service Management
Type I service provider ITIL® Service Management
Type II service provider ITIL® Service Management
Type III service provider ITIL® Service Management
underpinning contract ITIL® Service Management
unit cost ITIL® Service Management
urgency ITIL® Service Management
usability ITIL® Service Management
use case ITIL® Service Management
user ITIL® Service Management
user profile ITIL® Service Management
utility ITIL® Service Management
validation ITIL® Service Management
value chain ITIL® Service Management
value for money ITIL® Service Management
value network ITIL® Service Management
value on investment ITIL® Service Management
variable cost ITIL® Service Management
variable cost dynamics ITIL® Service Management
variance ITIL® Service Management
verification ITIL® Service Management
verification and audit ITIL® Service Management
version ITIL® Service Management
vision ITIL® Service Management
vital business function ITIL® Service Management
vulnerability ITIL® Service Management
warm standby ITIL® Service Management
warranty ITIL® Service Management
work in progress ITIL® Service Management
work instruction ITIL® Service Management
workaround ITIL® Service Management
workload ITIL® Service Management
16 megabyte line 16 megabyte line. Synonym for 16MB boundary.
2 Factor Authentication 2 Factor Authentication. A variant of Multi-Factor Authentication. See M
3270 application 3270 application. An application on a host system accessed by a 3270 termina
3270 data stream 3270 data stream. The commands, control codes, orders, attributes, and data o
3270 pass-through mode 3270 pass-through mode. A mode that lets a program running from the z/OS s
3GL 3GL. third generation language.
abend abend. abnormal end.
abend dump abend dump. A kind of dump produced when a program ends abnormally.
abnormal end abnormal end. End of a task, a job, or a subsystem because of an error conditio
abnormal termination abnormal termination. (1) The end of processing prior to scheduled terminatio
Abstract Syntax Notation Abstract Syntax Notation. See Abstract Syntax Notation One Jump .
accept accept. In SMP/E, to install SYSMODs in the distribution libraries. This is done w
ACCEPT command ACCEPT command. The SMP/E command used to install SYSMODs in the distr
Acceptance Test Procedure
accepted SYSMOD accepted SYSMOD. A SYSMOD that has been successfully installed by the SMP
access access. The ability to read, update, or otherwise use a resource. Access to protec
access authority access authority. An authority that relates to a request for a type of access to pr
access control access control. In computer security, ensuring that the resources of a computer 
access control block ACB. (1) access control block. (2) In IMS, application control block.
Access Control Entry Access Control Entry. Individual entries in a security descriptor (called an
access control entry ACE: access control entry
Access Control List Access Control List. A collection of Access Control Entries (ACE's) that spe
access control list ACL: access control list
Access Control Lists ACLs: Access Control Lists
Access Control Service Access Control Service (Azure)
access list access list. A list within a profile of all authorized users and their access authoriti
access method access method. A technique for moving data between main storage and I/O dev
ACID properties ACID properties. The properties of a transaction: atomicity, consistency, isolatio
acknowledgment ACK. acknowledgment field.
Acorn RISC Machine or Advanced RISC Machine Acorn RISC Machine or Advanced RISC Machine. A family of processors b
Acronym for Anti-Aliasing Acronym for Anti-Aliasing. See Anti-aliasing filter
Active Directory Active Directory. See Active Directory.
Active Directory Administrative Center Active Directory Administrative Center. See Active Directory Administrati
Active Directory Application Mode Active Directory Application Mode, now renamed Active Directory Lightw
Active Directory Based Activation Active Directory Based Activation. See Active Directory-Based Activation
Active Directory Certificate Services Active Directory Certificate Services. See Active Directory Certificate Serv
Active Directory Domain Services Active Directory Domain Services. Microsof's directory service product.
Active Directory Federation Services Active Directory Federation Services. See Active Directory Federation Ser
Active Directory Lightweight Directory Services Active Directory Lightweight Directory Services. This used to be called Ac
Active Directory Migration Tool Active Directory Migration Tool. Toolset to facilitate migration and restru
Active Directory Rights Management Services Active Directory Rights Management Services. See Active Directory Right
Active Directory Service Interface Active Directory Service Interface. A library of routines that provide an in
Active Directory Users and Computers, the MMC snap-i
Active Directory Users and Computers, the MMC snap-in used to manage
Active Directory Web Services Active Directory Web Services. A Windows service that provides a Web in
Active Server Pages Active Server Pages. Server-side script engine for dynamically generated
Active Server Pages .NET Active Server Pages .NET. Framework based on the Common Language R
ActiveX Data Objects ActiveX Data Objects. ADSI can act as an OLE-DB provider that allows dat
address address. The unique code assigned to each device, workstation or system conne
Address Resolution Protocol (Address Resolution Protocol) A protocol that provides dynamic mapping
Address Resolution Protocol
address space address space. A range of contiguous virtual storage addresses that the system
Address Windowing Extensions Address Windowing Extensions. A Windows api that allows a 32-bit sofw
addressing mode addressing mode (AMODE). A program attribute that refers to the address leng
adjacent link station adjacent link station (ALS). In SNA, a link station directly connected to a given 
adjacent node adjacent node. (1) In SNA, a node connected to another node by at least one p
adjacent subarea adjacent subarea. A subarea connected by one or more links to another subare
ADJSSCP ADJSSCP. adjacent SSCP table.
Administrative Unit Administrative Unit. See Administrative units (preview) | Graph API conc
administrator administrator. A person responsible for administrative tasks such as access aut
Advanced Encryption Standard (Advanced Encryption Standard) A symmetric 128-bit block data encrypti
Advanced Encryption Standard Advanced Encryption Standard. A specification for the encryption of elec
Advanced Encryption Standard
Advanced Peer-to-Peer Networking Advanced Peer-to-Peer Networking® (APPN). An extension to SNA featuring
Advanced Peer-to-Peer Networking. Advanced Peer-to-Peer Networking.
Advanced Program-to-Program Communication Advanced Program-to-Program Communication (APPC). An implementation
Advanced Technology Attachment Advanced Technology Attachment. Host adapter that allows a computer
Advanced Threat Protection Advanced Threat Protection. See Windows Defender Advanced Threat Pr
alert alert. To cause the user's terminal to give some audible or visual indication that a
alias alias. An alternate label; for example, a label and one or more aliases may be us
Allied Quality Assurance Publication
allocate allocate. To assign a resource for use in performing a specific task.
ALLOCATE command ALLOCATE command. In z/OS, the TSO/E command that serves as the connec
alphanumeric character alphanumeric character. A letter or a number.
Also known as stateful packet filter.
Alternate Access Mappings Alternate Access Mappings. Directs users to the correct URLs during thei
Amazon Web Services Amazon Web Services. See Amazon Web Services Jump .
Ambiguous Name Resolution, an efficient search algorit
Ambiguous Name Resolution, an efficient search algorithm in Active Dire
American Federation of Information Processing Societies.
American National Standards Institute
American Registry for Internet Numbers
American Standard Code for Information Interchange
anonymous user anonymous user. A portal user who has not logged in to the portal with a valid u
ANR ANR. automatic network routing.
ANSI ANSI. American National Standards Institute.
AOR AOR. application-owning region.
APAR APAR. authorized program analysis report.
APAR fix APAR fix. A temporary correction of a defect in an IBM system control program o
APF APF. authorized program facility.
APF-authorized APF-authorized. A type of system authorization using the authorized program fa
API API. application programming interface.
APPC APPC. advanced program-to-program communications.
application application. A program or set of programs that performs a task; some examples
application layer application layer. In the Open Systems Interconnection (OSI) reference model, 
Application Lifecycle Management Application Lifecycle Management. See Microsof Application Lifecycle M
Application Object Server Application Object Server. See AOS Overview [AX 2012] Jump .
application program application program. A collection of software components used to perform spec
Application Programming Interface Application Programming Interface. See Application programming interfa
Application Request Routing Application Request Routing. See Using the Application Request Routing
application service provider
Application under test
application-instance DVIPA application-instance DVIPA. A dynamic VIPA activated by an application that e
application-owning region application-owning region (AOR). In a CICSPlex® configuration, a CICS regio
apply apply. In SMP/E, to install SYSMODs in the target libraries. This is done with the
APPLY command APPLY command. The SMP/E command used to install SYSMODs in the target
APPN APPN. Advanced Peer-to-Peer Network.
appn Topology database exchanges with other APPN network nodes, enabling
APPN end node APPN end node. A node that provides a broad range of end-user services and s
APPN Implementation Workshop AIW. APPN Implementation Workshop.
APPN network APPN network. A collection of interconnected network nodes and their client en
APPN network node APPN network node. A node that offers a broad range of end-user services and
APPN node APPN node. An APPN network node or an APPN end node.
approximate commit system change number approximate CSCN: approximate commit system change number
ARB flow ARB flow. adaptive rate-based flow.
area border node ABR. area border node.
area border router area border router (ABR). Routers that attach to more than one area. All area b
ARM ARM. automatic restart management.
ARP ARP. Address Resolution Protocol.
ARPANET ARPANET. A network established by the United States Department of Defense Ad
Artificial Intelligence Applications Testing.
As the packet travels through the network protocol stack, the protocols at each layer either add or remove fields from the basi
ASCII ASCII. American Standard Code for Information Interchange.
ASID ASID. address space identifier.
ASSEM entry ASSEM entry. An SMP/E entry containing assembler statements that can be ass
assembler assembler. A computer program that converts assembler language instructions i
assembler language assembler language. A symbolic programming language that comprises instruc
Association for Computing Machinery.
Asynchronous JavaScript And XML Asynchronous JavaScript And XML. See Ajax (programming) Jump .
asynchronous processing asynchronous processing. A series of operations that are done separately from
Asynchronous Transfer Mode Asynchronous Transfer Mode (ATM). A transfer mode in which the information
ATM ATM. (1) Asynchronous Transfer Mode. (2) automatic teller machine.
Atomicity, Consistency, Isolation, and Durability ACID: Atomicity, Consistency, Isolation, and Durability
attention identifier AID. attention identifier.
AT-TLS AT-TLS. Application Transparent Transport Layer Security.
Attribute Certificate Attribute Certificate. A digital X.509 document containing attributes asso
Attribute Component Capability (Attribute Component Capability) analysis
Attribute Scoped Query Attribute Scoped Query. See Performing an Attribute Scoped Query Jump
Attributes that are derived from the information in a network packet's header that serve as the basis for creating flows. The att
audit audit. To review and examine the activities of a data processing system mainly to
Audit Collection Services Audit Collection Services (SC Operations Manager)
Authenticated Encryption with Associated Data Authenticated Encryption with Associated Data. See Authenticated encry
authentication authentication. In computer security, verification of the identity of a user or proc
Authentication Package Authentication Package. See Authentication Packages Jump .
authority authority. The right to access objects, resources, or functions.
Authority Information Access Authority Information Access. Points to the public key for the certificate
authorization authorization. The process of granting a user either complete or restricted acce
authorization checking authorization checking. The action of determining whether a user is permitted 
authorized program analysis report authorized program analysis report (APAR).  A request for correction of a prob
authorized program facility authorized program facility (APF). A facility that permits identification of progra
automated operations automated operations. Automated procedures to replace or simplify actions of
Automated Sofware Test Framework
Automated test and retest
Automated test generator
Automated testing lifecycle methodology
automatic call automatic call. The process used by the linkage editor to resolve external symb
automatic call distribution
automatic call library automatic call library. Contains load modules or object decks that are to be use
Automatic Database Diagnostic Monitor ADDM: Automatic Database Diagnostic Monitor
Automatic Diagnostic Repository ADR: Automatic Diagnostic Repository
automatic library call automatic library call. Automatic call. See automatic call library.
automatic restart automatic restart. A restart that takes place during the current run, that is, witho
automatic restart management automatic restart management. A z/OS recovery function that improves the a
Automatic Storage Management ASM: Automatic Storage Management
Automatic Virtual Machine Activation Automatic Virtual Machine Activation. See Automatic Virtual Machine Ac
Automatic Workload Repository AWR: Automatic Workload Repository
automation automation. A program or facility that performs certain operations automatically
auxiliary storage auxiliary storage. All addressable storage other than processor storage.
availability availability. The degree to which a system or resource is ready when needed to 
availability management
availability management information system
Availability Management Information System
Average Method Complexity
Azure Active Directory Azure Active Directory. Active Directory Domain Services in the Windows
Azure Active Directory Join Azure Active Directory Join. See Azure AD Join on Windows 10 devices Ju
Azure AD, B2B, B2C, DS, B2x – Straining the Alphabet Business 2 (to) X, meaning both Business To Business (B2B) and Business
Azure Analysis Services Azure Analysis Services. See What is Azure Analysis Services? Jump
Azure Data Lake Analytics Azure Data Lake Analytics. See Managing Pipeline & Recurring Jobs in Az
Azure Disk Encryption Azure Disk Encryption. See Announcing Azure Disk Encryption Preview fo
Azure Information Protection Azure Information Protection. See What is Azure Information Protection?
Azure Kubernetes Service Azure Kubernetes Service.
Azure Site Recovery Azure Site Recovery. See Microsof Azure Site Recovery: Your DR Site in M
Azure SQL Database and the new Database ThroughpuDatabase Throughput Units. See Azure SQL Database and the new Datab
backbone backbone. (1) A set of nodes and their interconnecting links providing the primar
background background. (1) In multiprogramming, the environment in which low-priority prog
Background Intelligent File Transfer Service Background Intelligent Transfer Service. See Background Intelligent File T
background job background job. (1) A low-priority job, usually a batched or non-interactive job. (
backout backout. A request to remove all changes to resources since the last commit or b
backplane backplane. A circuit board that connects several connectors in parallel to each o
backup backup. (1) Pertaining to a system, device, file, or facility that can be used in the
backup domain controller Backup Domain Controller. In NT domains there was one primary domain
backup host backup host. A host that is designated as a backup in the event that the distribu
BAL BAL. Basic Assembler Language.
bandwidth bandwidth. (1) The capacity of a communications line, normally expressed in bi
Bandwidth On Demand Interoperability Group
Bare-metal restore Bare Metal Recovery. Or Bare Metal Restore. See Bare-metal restore Jum
base function base function. In SMP/E, a SYSMOD defining elements of the base z/OS syste
base level system base level system. In SMP/E, the level of the target system modules, macros, s
Baseboard management controller Baseboard Management Controller. See Baseboard management control
basic information unit basic information unit (BIU). In SNA, the unit of data and control information p
batch batch. A group of records or data processing jobs brought together for processin
batch job batch job. A predefined group of processing actions submitted to the system to b
batch message processing batch message processing (BMP) program. An IMS™ batch processing prog
batch processing batch processing. A method of running a program or a series of programs in wh
BCP BCP. base control program.
Best Practices Analyzer Best Practices Analyzer. A server management tool. See Best Practices An
Beta. Community Technology Preview (or Customer Technology Preview). Ofe
BEX BEX. branch extender.
big endian big endian. A format for the storage of binary data in which the most significant b
Binary Binary to text encoding scheme, according to a MIME specification. Enco
binary data binary data. (1) Any data not intended for direct human reading. Binary data ma
Binary large object Binary Large Object. A collection of binary data stored as a single entity i
Binary Large Object BLOB: Binary Large Object
bind bind. (1) To combine one or more control sections or program modules into a sin
binder binder. The z/OS program that processes the output of the language translators 
BIOS Basic Input/Output System. Computer firmware interface. See BIOS Jump
Bit Error Test
BizTalk Development Framework. BizTalk Development Framework.
BizTalk Services Azure BizTalk Services, a cloud-based integration service. See BizTalk Serv
BLK BLK. A subparameter of the SPACE parameter in a DD statement. It specifies tha
BLKSIZE BLKSIZE. block size.
BLOB BLOB. binary large object.
block block. (1) A set of consecutive pages on disk. (2) A unit of data storage on a devi
block size block size. (1) The number of data elements in a block. (2) A measure of the size
Blue Screen Of Death . The blue error screen displayed by some operating systems afer encou
book package book package. In IBM mainframes, a pre-assembled collection of physical hardw
Border Gateway Protocol (Border Gateway Protocol) A protocol that exchanges routing information
Border Gateway Protocol
border node border node. An APPN network node that interconnects APPN networks having
boundary function boundary function (BF). In SNA, a capability of a subarea node to provide prot
Boundary Value Analysis
BPAM BPAM. basic partitioned access method.
branch extender branch extender. An extension to the APPN network architecture that appears a
branch network node branch network node (BrNN). See branch extender .
BrEx BrEx. branch extender.
bridge bridge. A functional unit that interconnects multiple LANs (locally or remotely) tha
Bring your own device Bring Your Own Device. See Bring your own device Jump .
Bring Your Own Encryption Bring Your Own Key. Also called Bring Your Own Encryption (BYOE). See B
Bring Your Own. Bring Your Own.
British Computer Society.
British Standard
British Standard BS 7925-1 Vocabulary of terms in sofware testing
British Standards Institution
BrNN BrNN. branch network node.
broadcast broadcast. (1) Transmission of the same data to all destinations. (2) Simultaneo
broadcast search broadcast search. The propagation of a search request, when the location of a 
Browser Integrated Test Environment
BSAM BSAM. basic sequential access method.
buffer buffer. (1) A portion of storage used to hold input or output data temporarily. (2) A
Buffer Cache Hit Ratio . Percentage of pages found in the buffer pool without incurring a read fr
buffer pool buffer pool. An area of memory into which data pages are read, modified, and h
Built-in self-test
bus bus. A facility for transferring data between several devices located between two
Business 2 Business 2 (to) Consumer. See Retail Jump .
Business activity monitoring Business Activity Monitoring. Sofware to monitor business activities. Se
Business Continuity and Disaster Recovery. Business Continuity and Disaster Recovery.
business continuity management
business continuity plan
business impact analysis
Business intelligence Business Intelligence. See Business intelligence Jump .
Business Intelligence Development Studio Business Intelligence Development Studio. See Business Intelligence Dev
business relationship manager
Business Requirement
Business Requirement Specification.
Business Rule Engine Also the Business Rules Engine, aBusiness Rule Engine, a BizTalk feature. See Business Rule Engine Jump .
business service management
Business-to-business Business 2 (to) Business. See Business-to-business Jump .
Business-to-Business B2B: Business-to-Business
Business-to-Consumer B2C: Business-to-Consumer
Business-to-employee Business 2 (to) Employee. See Business-to-employee Jump .
BX BX. branch extender.
bypass bypass. In SMP/E, to circumvent errors that would otherwise cause SYSMOD pr
byte multiplexer channel byte multiplexer channel. A multiplexer channel that interleaves bytes of data.
byte stream byte stream. A simple sequence of bytes stored in a stream file. Contrast with re
C language C language. A high-level language used to develop software applications in com
c omponent trace CTRACE. c omponent trace.
CA CA. certificate authority.
cabinet cabinet. Housing for panels organized into port groups of patchports, which are 
cable cable "in inventory." Unused cables.
cache cache. A special-purpose buffer storage, smaller and faster than main storage, u
cache structure cache structure. A coupling facility structure that enables high-performance sha
cage cage. An area within a frame that contains hardware elements required for either
Call Quality Dashboard for Skype for Business Server Call Quality Dashboard. See Call Quality Dashboard for Skype for Busines
Callback Control Protocol (Callback Control Protocol) A proprietary Microsof PPP extension that is
Callback Control Protocol
called routine called routine. A routine or program that is invoked by another.
capability maturity model
Capability Maturity Model Integrated
capability maturity model integration
Capability Maturity Model
capacity capacity. A measure of how much volume can be handled by a specific resource
capacity management information system
capital expenditure
Cardholder information security program
carriage control character carriage control character. An optional character in an input data record that sp
carriage return carriage return (CR). (1) A keystroke generally indicating the end of a command
Carrier Sense Multiple Access with Collision DetectionCarrier Sense Multiple Access with Collision Detection (CSMA/CD). A med
carrier sense multiple access with collision detection CSMA/CD. carrier sense multiple access with collision detection.
carrier-supplied communication line CSCL. carrier-supplied communication line.
CART CART. command and response token.
Cascading Style Sheets Cascading Style Sheets. A style sheet language to format a document wr
case-sensitive case-sensitive. Pertaining to the ability to distinguish between uppercase and lo
catalog catalog. (1) A directory of files and libraries, with reference to their locations. (2) T
cataloged data set cataloged data set. A data set that is represented in an index or hierarchy of ind
cataloged procedure cataloged procedure. A set of job control language (JCL) statements placed in 
Cell Directory Services CDS: Cell Directory Services
CEMT CEMT. The CICS-supplied transaction that allows checking of the status of termin
central directory server CDS. central directory server.
central directory server central directory server. A network node that provides a repository for informat
central electronic complex CEC. central electronic complex.
central electronic complex central electronic complex (CEC). Obsolete term for central processor comp
Central processing unit Central Processing Unit. See Central processing unit Jump .
central processing unit central processing unit (CPU). Synonymous with processor.
central processing unit CPU. central processing unit.
central processor central processor (CP). The part of the computer that contains the sequencing 
central processor CP. (1) central processor. (2) control point.
central processor complex central processor complex (CPC). A physical collection of hardware that consis
central processor complex CPC. central processor complex.
central storage central storage. (1) In z/OS, the storage of a computing system from which the 
certificate authority (certificate authority) A trusted third-party organization or company that
certificate authority
Certificate authority Also Conditional Access. Certificate Authority, or sometimes Certification Authority. An entity that
certificate revocation list (certificate revocation list) A list of public key certificates that have been
certificate revocation list
Certificate signing request Certificate Signing Request. In public key infrastructure (PKI) systems, a m
CF CF. coupling facility
CFRM CFRM. coupling facility resource management.
CGI CGI. Common Gateway Interface.
Challenge Handshake Authentication Protocol (Challenge Handshake Authentication Protocol) An authentication protoc
Challenge Handshake Authentication Protocol
Change Advisory Board
Change Request
channel channel. In mainframe computing, the part of a channel subsystem that manage
channel adapter channel adapter. A device that groups two or more controller channel interfaces
channel command word CCW. channel command word.
channel connection address channel connection address (CCA). The input/output (I/O) address that unique
Channel Data Control Link protocol CDLC. Channel Data Control Link protocol.
channel interface channel interface. The circuitry in a storage control that attaches storage paths
channel interface processor CIP. channel interface processor.
channel path channel path. In mainframe computing, the interconnection between a channel 
channel path identifier channel path identifier. The logical equivalent of channels in the physical proce
channel path identifier CHPID. channel path identifier.
channel subsystem channel subsystem (CSS). A collection of subchannels that directs the flow of in
channel subsystem CSS. channel subsystem.
channel-to-channel channel-to-channel (CTC). The communication (transfer of data) between prog
channel-to-channel CTC. channel-to-channel.
channel-to-channel adapter channel-to-channel adapter (CTCA). An input/output device that is used a pro
channel-to-channel connection channel-to-channel connection. A connection between two CHPIDs on the sa
channel-to-channel connection CTC connection. channel-to-channel connection.
character character. A letter, digit, or other symbol. A letter, digit, or other symbol that is use
character data CDATA: character data
Character Large Object CLOB: Character Large Object
character large object CLOB. character large object.
checkpoint checkpoint. (1) A place in a routine where a check, or a recording of data for res
checkpoint data set checkpoint data set. A data set in which information about the status of a job an
checkpoint write checkpoint write. Any write to the checkpoint data set. A general term for the pr
Choose Your Own Device. Choose Your Own Device.
Cipher Block Chaining CBC: Cipher Block Chaining
circuit switching circuit switching. A process that, on demand, connects two or more data termin
Claims Based Access . Also Claims Based Authentication.
Claims Providers Claims Provider. See Claims Providers Jump .
Class, Responsibility, Collaboration
client client. A system or process that is dependent on another system or process (usu
Client access license Client Access License. See Client access license Jump .
Client Access server Also Cloud Application Security. Client Access Server. An Exchange Server role that provides authenticatio
client-server client-server. In TCP/IP, the model of interaction in distributed data processing in
Client-side Processing of Group Policy Client Side Extensions. A dynamic-link library (DLL) that implements a gro
Cloud and Datacenter Management System Center UpCloud and Datacenter Management. See Cloud and Datacenter Managem
Cloud Solution Provider Cloud Solution Provider. See Cloud Solution Provider program for hosting
cluster cluster. A group of interconnected computers that are working together as one un
Cluster File System CFS: Cluster File System
Cluster Synchronization Services CSS: Cluster Synchronization Services
Cluster Verification Utility CVU: Cluster Verification Utility
CMOS CMOS. complementary metal-oxide semiconductor.
CMS CMS. Conversational Monitor System.
CMT CMT. CHPID mapping tool.
CNN CNN. composite network node.
COBOL COBOL. Common Business-Oriented Language.
Code division multiple access Code Division Multiple Access. A channel access method used in radio co
code page code page. (1) An assignment of graphic characters and control function meanin
code point code point. A 1-byte code representing one of 256 potential characters.
coexistence coexistence. Two or more systems at different levels (for example, software, ser
collision collision. An unwanted condition that results from concurrent transmissions on a
command command. A request to perform an operation or run a program. When paramete
command and response token command and response token (CART). A parameter on WTO, WTOR, MGCR
command list CLIST. command list.
command prefix command prefix. A one- to eight-character command identifier. The command p
COMMAREA COMMAREA. A communication area made available to applications running und
Comma-separated values Also Cluster Shared Volume.Comma-Separated Values. A plaintext file of records with fields separate
commercial off the shelf
Commercial Off-The-Shelf
commit commit. A request to make all changes to resources since the last commit or ba
Common Business-Oriented Language Common Business-Oriented Language (COBOL).  A high-level language, base
Common Information Model Common Information Model. The repository in the WMI schema that sto
Common Intermediate Language Common Intermediate Language. Lowest level human readable program
Common Language Infrastructure Common Language Infrastructure. An open specification developed by M
Common Language Runtime Common Language Runtime. A run-time environment provided by the .N
Common Link Access to Workstation CLAW. Common Link Access to Workstation.
common name Common Name in Active Directory. Also the moniker for objects with a c
Common Object Request Broker API CORBA: Common Object Request Broker API
Common Object Request Broker Architecture
Common Open Policy Service
Common Oracle Runtime Environment CORE: Common Oracle Runtime Environment
common service area common service area (CSA). In z/OS, a part of the common area that contains
common service area CSA. common service area.
Common Warehouse Metadata CWM: Common Warehouse Metadata
communication controller communication controller. A type of communication control unit whose operati
communication line communication line. Deprecated term for telecommunication line.
Communications Controller for Linux CCL. Communications Controller for Linux®.
Communications Controller for Linux Communications Controller for Linux (CCL). A software product for mainfram
Communications Server Communications Server. IBM software that supports (a) the development and u
Communications Storage Manager Communications Storage Manager (CSM). In z/OS Communications Server, 
Communications Storage Manager CSM. Communications Storage Manager.
compatibility compatibility. Ability to work in the system or ability to work with other devices o
compilation unit compilation unit. A portion of a computer program sufficiently complete to be co
compiler compiler. A program that translates a source program into an executable program
compiler options compiler options. Keywords that can be specified to control certain aspects of c
complementary metal oxide semiconductor complementary metal oxide semiconductor (CMOS). A technology that com
component component. A functional part of an operating system; for example, the schedule
component capacity management
component failure impact analysis
Component Object Model . Standard for sofware components that enables interprocess communic
Component Object Model COM: Component Object Model
component trace component trace. A service that provides a way for z/OS components to collec
composite network node composite network node. A type 5 node and its subordinate type 4 nodes that
Compression Control Protocol (Compression Control Protocol) A subprotocol of PPP that negotiates the
Compression Control Protocol
Computer Aided Sofware Testing
Computer Emergency Response Team
computer telephony integration
Computer-aided design Computer-Aided Design. See Computer-aided design Jump .
Computer-Aided Sofware Engineering
concentrator concentrator. (1) In data transmission, a functional unit that permits a common t
condition code condition code. A code that reflects the result of a previous input/output, arithm
configuration configuration. The arrangement of a computer system or network as defined by
Configuration accounting
Configuration control
Configuration identification
configuration item
Configuration item
Configuration management database Configuration Management DataBase. See Configuration management d
configuration management database
Configuration management plan
configuration management system
Configuration Management Tool
Configuration management
configuration of interconnected CICS CICSplex. A configuration of interconnected CICS systems in which each system
connection connection. (1) In data communications, an association established between fu
Connection Manager Administration CMADMIN: Connection Manager Administration
Connection Manager Administration Kit Connection Manager Administration Kit. Sofware for managing remote c
Connection Manager gateway CMGW: Connection Manager gateway
connectionless protocol connectionless protocol. A transport protocol, such as UDP, that does not requ
connection-oriented protocol connection-oriented protocol. A protocol requiring establishment of a session
connectivity connectivity. (1) The capability of a system or device to be attached to other sys
consistent copy consistent copy. A copy of data entity (for example, a logical volume) that conta
console console. An input/output device on a computer, reserved for communication betw
console group console group. In z/OS, a group of consoles defined in CNGRPxx, each of who
consolidated sofware inventory CSI. consolidated software inventory data set. See SMPCSI.
Content Delivery Network Content Delivery Network, a global solution for delivering high-bandwidt
continual service improvement
continual service improvement plan
control block control block. A storage area used by a computer program to hold control inform
control interval CI. control interval.
control interval control interval (CI). A fixed-length area or disk in which VSAM stores records a
Control OBjectives for Information and related Technology
control region control region. The main storage region that contains the subsystem work mana
control section control section (CSECT). The part of a program specified by the programmer to
control section CSECT. control section.
control statement control statement. In programming languages, a statement that is used to alter
control unit control unit (CU). A device that coordinates and controls the operation of one o
control unit CU. control unit.
control unit address control unit address. The high order bits of the storage control address, used to
controller controller. Synonymous with control unit .
Converged Network Adapter , or converged network interface controller (C-NIC). Computer input/outp
convergence convergence. The recognition of changes in a network by a dynamic routing pro
conversation conversation. A logical connection between two programs over an LU type 6.2 s
conversational conversational. Pertaining to a program or a system that carries on a dialog with
conversational monitor system conversational monitor system (CMS). A virtual machine operating system tha
coordinated universal time UTC: coordinated universal time
CORBA CORBA. Common Object Request Broker Architecture.
core service package
corequisite SYSMODs corequisite SYSMODs. SYSMODs each of which can be installed properly only 
corrective service corrective service. Any SYSMOD used to selectively fix a system problem. Gen
CoS CoS. class of service.
Cost of achievement
Cost of failure
cost of quality
count-key data CKD. count-key data.
count-key data count-key data. A disk storage device for storing data in the format: count field n
couple data set couple data set. A data set that is created through the XCF couple data set form
coupling facility coupling facility. A special logical partition that provides high-speed caching, lis
coupling facility channel coupling facility channel. A high bandwidth fiber optic channel that provides th
coupling services coupling services. In a sysplex, the functions of XCF that transfer data and statu
CP-CP session CP-CP session. A parallel session between two control points, using LU 6.2 proto
create link pack area CLPA. create link pack area.
create link pack area create link pack area (CLPA). An option that is used during IPL to initialize the l
Create, read, update and delete Create, Read, Update, and Delete. See Create, read, update and delete Ju
Create, Read, Update, Delete
Critical design review
Critical error
critical success factor
Critical Success Factors
CRL Distribution Point . Location where the Certificate Revocation List (CRL) is maintained, allow
crossbar switch crossbar switch. A static switch that can connect controllers to processors with p
cross-domain resource CDRSC. cross-domain resource.
cross-domain resource manager cross-domain resource manager (CDRM). In VTAM, the function in the system
cross-domain resource manager CDRM. cross-domain resource manager.
cross-memory linkage cross-memory linkage. A method for invoking a program in a different address 
cross-system coupling facility cross-system coupling facility (XCF). A component of z/OS that allows authoriz
cross-system extended services cross-system extended services (XES). A set of z/OS services that allow multip
cross-system restart cross-system restart. If a system fails, automatic restart management restarts e
cryptographic key cryptographic key. A parameter that determines cryptographic transformations b
cryptography cryptography. The transformation of data to conceal its meaning.
Cryptography Next Generation Cryptography Next Generation. Cryptographic development platorm intr
cumulative service tape cumulative service tape. A tape sent with a new function order, containing all c
Cumulative Update. Cumulative Update.
Customer Information Control System CICS. Customer Information Control System.
Customer Information Control System Customer Information Control System (CICS). An online transaction processi
Customer relationship management Customer Relationship Management. See Customer relationship manage
customer-replaceable unit CRU. customer-replaceable unit.
customer-replaceable unit customer-replaceable unit (CRU). An assembly or part that a customer can re
Customized way of categorizing network packets based on a single attribute or a combination of attributes. The attributes that
cylinder cylinder. (1) A unit of storage on a count-key-data (CKD) device with a fixed num
DACLs and ACEs Discretionary Access Control List. See DACLs and ACEs Jump .
daemon daemon. In UNIX® systems, a long-lived process that runs unattended to perfor
DAF DAF. destination address field.
DASD DASD. direct access storage device.
DASD volume DASD volume. A DASD space identified by a common label and accessed by a 
Data analysis expressions Data Analysis Expressions. The native formula and query language for Mi
data center bridging (data center bridging) An L2 technology that is used to manage the band
data center bridging
Data Center Bridging Data Center Bridging. Enhancements to Ethernet Local Area Networks (LA
Data Center Bridging Exchange Protocol (Data Center Bridging Exchange Protocol) A protocol that enables commu
Data Center Bridging Exchange Protocol
Data Center Transmission Control Protocol Data Center Transmission Control Protocol. See Data Center Transmission
data class data class. A collection of allocation and space attributes, defined by the storage
data communication data communication. The process of sending or receiving data between two po
data communication DC. data communication.
Data Consistency as a Service Data Center as a Service. Also the Data Consistency as a Service. See DCa
data control block data control block (DCB). A control block used by access method routines in stor
data control block DCB. data control block.
Data definition language Data Definition Language. Also Data Description Language. Syntax for de
data definition name ddname. data definition name.
data definition name data definition name (ddname). (1) The name of a data definition (DD) statem
data definition statement data definition statement. A JCL control statement that serves as the connecti
Data distribution service
data division data division. In COBOL, the part of a program that describes the files to be use
Data Encryption Standard (Data Encryption Standard) A symmetric-key 64-bit block data encryption
Data Encryption Standard Data Encryption Standard. A specification for the encryption of electroni
Data Encryption Standard DES: Data Encryption Standard
Data Encryption Standard
Data -Encryption Standard
Data Execution Prevention Data Execution Prevention. A security feature of an operating system to p
Data Facility Sort Data Facility Sort (DFSORT™). An IBM licensed program that is a high-speed d
Data Flow Diagram
data in transit data in transit. The update data on application system DASD volumes that is be
data integrity data integrity. The condition that exists when accidental or intentional destructio
data link control data link control (DLC). A set of rules used by nodes on a data link (such as an
data link layer data link layer. In the Open Systems Interconnection reference model, the layer
data link switching data link switching (DLSw). A method of transporting network protocols that us
Data loss prevention Data Loss Prevention. See Data loss prevention Jump .
Data manipulation language Data Manipulation Language. Syntax used for selecting, inserting, deletin
Data Protection Manager Data Protection Manager. See Data Protection Manager Jump .
data service unit (data service unit) A synchronous telecommunications device that is use
data service unit
data set data set. In z/OS, a named collection of related data records that is stored and re
data set backup data set backup. Backup to protect against the loss of individual data sets.
data set label data set label. (1) A collection of information that describes the attributes of a da
data sharing data sharing. The ability of concurrent subsystems (such as DB2® or IMS DB) o
data space data space. z/OS shared memory, somewhat like shared memory regions in PO
data stream data stream. (1) A continuous stream of data elements being transmitted, or inte
data type data type. The properties and internal representation that characterize data.
data warehouse data warehouse. A system that provides critical business information to an orga
Database DataBase Management System. See Database Jump .
database database. A collection of interrelated or independent data items that are stored to
Database Access Descriptor DAD: Database Access Descriptor
Database as a Service Database as a Service. See Database as a Service (DaaS) Solution Jump .
Database availability groups Database Availability Group. A high availablity feature of Exchange serve
DataBase Consistency DataBase Console Commands. A series of Transact-SQL commands to che
Database design document
database management system DBMS. database management system.
database point-in-time recovery DBPITR: database point-in-time recovery
database writer process DBWn: database writer process
datagram datagram. In packet switching, a self-contained packet, independent of other pa
Datagram Transport Layer Security protocol Datagram Transport Layer Security. See Datagram Transport Layer Securi
datalink multipathing aggregation (datalink multipathing aggregation) A type of link aggregation that provid
datalink multipathing aggregation
Data-to-Information-to-Knowledge-to-Wisdom
Data-to-Information-to-Knowledge-to-Wisdom.
DB2 data sharing group DB2 data sharing group. A collection of one or more concurrent DB2 subsystem
DD statement DD statement. data definition statement.
DDL logical change record DDL LCR: DDL logical change record
deadlock deadlock. (1) An error condition in which processing cannot continue because e
deallocate deallocate. To release a resource that is assigned to a specific task.
declarations generator DCLGEN. declarations generator.
declarations generator declarations generator (DCLGEN). A subcomponent of DB2 that generates SQ
dedicated dedicated. Pertaining to the assignment of a system resource--a device, a progr
default default. A value that is used or an action that is taken when no alternative is exp
Defect Removal Efficiency
Defense Advanced Research Projects Agency
Defense Standard
deferred restart deferred restart. A restart performed by the system when a user resubmits a job
deleted function deleted function. In SMP/E, a function that was removed from the system when
demilitarized zone (demilitarized zone) An isolated network that is set up to prevent public a
demilitarized zone
denial-of-service DoS: denial-of-service
Denial-of-service attack Distributed Denial of Service attack. See Denial-of-service attack Jump .
Department Of Defense
Department of Homeland Security
Department of Trade and Industry —
dependent LU dependent LU. See SSCP-dependent LU.
dependent LU requester dependent LU requester (DLUR). An APPN end node or network node that: (a
dependent LU server dependent LU server (DLUS). An APPN network node that provides SSCP ser
DER encoding Distinguished Encoding Rules . See DER encoding Jump .
destination destination. (1) A combination of a node name and one of the following: a user I
destination node destination node. The node that provides application services to an authorized
Detailed Design Document
Determines the amount of data sent through the network. This data is the product of the available network bandwidth and the
device device. A computer peripheral or an object that appears to the application as suc
device address device address. The field of an ESCON® device-level frame that selects a spec
device control unit device control unit. A hardware device that controls the reading, writing, or disp
device number device number. A four-hexadecimal-character identifier, for example 13A0, that 
Device Support Facilities program Device Support Facilities program (ICKDSF).  A program used to initialize DAS
device type device type. The general name for a kind of device; for example, 3390.
DFSMS DFSMS. Data Facility Storage Management Subsystem.
DFSMShsm™ DFSMShsm™. An IBM product used for backing up and recovering data, and ma
DFSORT DFSORT. Data Facility Sort.
DFS™ DFS™. Distributed File Service.
DHCP Dynamic Host Configuration Protocol. Service that provides centralized c
DHCP unique identifier (DHCP unique identifier) An identifier that is used to identify the client sy
DHCP unique identifier
DHTMLX Dynamic HyperText Markup Language eXensions. See DHTMLX Jump .
Diagnostics and Recovery Toolset Microsof Diagnostics and Recovery Toolset. Toolset to troubleshoot and
dialog dialog. An interactive pop-up window containing options that allow you to browse
Difference between LTSB, CB, CBB for Windows 10. Current Branch. See Difference between LTSB, CB, CBB for Windows 10.
Difference between LTSB, CB, CBB for Windows 10. Current Branch for Business. See Difference between LTSB, CB, CBB for W
Diffie–Hellman key exchange Diffie-Hellman. A public key protocol, for securely exchanging cryptograp
digital certificate digital certificate. An electronic document used to identify an individual, server,
Digital Data System
Dijkstra's shortest path algorithm Dijkstra's shortest path algorithm. An algorithm named after E.W. Dijkstra tha
direct access storage device direct access storage device (DASD). A device in which the access time is effe
Direct Attached Storage DAS: Direct Attached Storage
direct memory access (direct memory access) Some devices can perform data transfers that inv
Direct memory access Direct Memory Access. Allows computer hardware subsystems to access
direct memory access
direct memory access direct memory access (DMA). The system facility that allows a device to get d
direct server return (direct server return) A mode that allows the Integrated Load Balancer to
direct server return
directed Locate search directed Locate search. A search request sent to a specific destination node kn
directory directory. (1) A type of file containing the names and controlling information for o
Directory Information Tree . The Active Directory database file on a Domain Controller is referred to
directory information tree DIT: directory information tree
Directory Services Restore Mode . Used on Domain Controllers to take the instance of Active Directory on
disabled wait state disabled wait state. Pertaining to a state of a processing unit that prevents the 
disaster recovery disaster recovery. Recovery after a disaster, such as a fire, that destroys or othe
Disaster Recovery. Disaster Recovery.
disk disk. A storage device that includes one or more flat, circular plates with magneti
DISP DISP. Disposition; a JCL DD parameter.
dispatch dispatch. (1) To allocate processing time on a specific device for a job that is rea
dispatcher processes Dnnn: dispatcher processes
dispatching priority dispatching priority. A number assigned to tasks, used to determine the order i
display console display console. In z/OS, an MCS console whose input/output function you can 
distinguished name (distinguished name) A standardized method of using ordinary strings to
distinguished name DN: distinguished name
distinguished name
Distributed Component Object Model Distributed Component Object Model. Microsof technology for commun
Distributed Component Object Model DCOM: Distributed Component Object Model
distributed computing distributed computing. Computing that involves the cooperation of two or more
Distributed Computing Environment DCE: Distributed Computing Environment
Distributed Computing Environment Distributed Computing Environment (DCE).  A comprehensive, integrated set
distributed data distributed data. Data that resides on a DBMS other than the local system.
distributed directory services Distributed directory services, including registration of its domain resour
Distributed File Service Distributed File Service (DFS). A DCE component. DFS joins the local file syste
Distributed File System Distributed File System. Client and server services that allow servers to o
Distributed File System Replication Distributed File System Replication. See Distributed File System Replicatio
Distributed Transaction Processing DTP: Distributed Transaction Processing
distributing host distributing host. The designated contact (point of entry) for a sysplex. The dist
distribution library distribution library (DLIB). A library that contains the master copy of all the elem
distribution zone distribution zone. In SMP/E, a group of records in a CSI data set that describes
DLIB DLIB. distribution library.
DLL DLL. dynamic link library.
DLSw DLSw. data link switching.
DLU DLU. destination logical unit.
DLUR DLUR. dependent LU requester.
DLUS DLUS. dependent LU server.
DMA DMA. direct memory access.
DMZ DeMilitarized Zone. A perimeter network or subnetwork exposed to an u
DNS DNS. domain name server.
DNX Utility. DNX Utility.
Do It Yourself. Do It Yourself.
Do Not Forward. Do Not Forward.
Document Object Model DOM: Document Object Model
Document Object Model
Document Type Definition DTD: Document Type Definition
domain domain. (1) In SNA communications, the network resources under control of a p
Domain Controller in Active Directory networks. Also the moniker for Domain Component,
Domain Functional Level . Specifies the versions of Windows Server supported as domain controll
domain name server domain name server. In the Internet suite of protocols, a server program that su
domain name system (domain name system) A service that provides the naming policy and me
Domain Name System Domain Name System. The service that resolves computer names into IP
Domain Name System DNS: Domain Name System
domain name system
domain of interpretation (domain of interpretation) A DOI defines data formats, network traffic ex
domain of interpretation
DOS Also Denial of Service attack. Disk Operating System. Several Microsof operating systems before Wind
Dot Net Execution Environment. Dot Net Execution Environment.
Double Byte Character Set Double Byte Character Set. A character encoding in which all characters a
double-byte character set DBCS. double-byte character set.
double-byte character set double-byte character set (DBCS). A set of characters in which each characte
doubleword doubleword. A sequence of bits or characters that comprises eight bytes (two 4
downwardly compatible downwardly compatible. The ability of applications to run on previous releases
drain drain. Allowing a printer to complete its current work before stopping the device.
driving system driving system. The system used to install the program. Contrast with target sys
DS codepoint (DS codepoint) A 6-bit value that is included in the Differentiated Service
DS codepoint
DS DB DS DB. directory services database.
DSA Class Also Directory System Agent. Digital Signature Algorithm. See DSA Class Jump . Also Directory System A
dsname dsname. data set name.
DSORG DSORG. Data set organization (parameter of DCB and DD and in a data class de
DTC Distributed Transaction Coordinator. See DTC Jump .
dump dump. (1) A report showing the contents of storage. Dumps are typically produce
duplex duplex. Pertaining to communication in which data can be sent and received at t
dvipa DVIPA. Dynamic V irtual IP Address.
Dynamic Access Control: Scenario Overview Dynamic Access Control. Provides data governance across file servers to
dynamic allocation dynamic allocation. Assignment of system resources to a program at the time t
Dynamic Bandwidth Allocation
Dynamic Data Masking Dynamic Data Masking. See Dynamic Data Masking Jump .
Dynamic DNS Dynamic Domain Name System, or Dynamic DNS. See Dynamic DNS Jum
Dynamic Host Configuration Protocol (Dynamic Host Configuration Protocol) A protocol that enables automatic
Dynamic Host Configuration Protocol Discover, Offer, Request, Acknowledge. The four phases in typical DHCP o
Dynamic Host Configuration Protocol
Dynamic HTML Dynamic HyperText Markup Language. See Dynamic HTML Jump .
Dynamic Language Runtime Overview Dynamic Lanuage Runtime. See Dynamic Language Runtime Overview Ju
dynamic link library dynamic link library (DLL). A file containing executable code and data bound to
dynamic reconfiguration (dynamic reconfiguration) An operating system feature that is used to rec
dynamic reconfiguration dynamic reconfiguration. The ability to make changes to the channel subsyste
dynamic reconfiguration
dynamic routing protocol dynamic routing protocol. A protocol that adjusts automatically to network topo
Dynamic Systems Development Methodology
dynamic VIPA dynamic VIPA (DVIPA). A function that allows the system to move IP addresses
dynamic VPN dynamic VPN. A type of virtual private network that requires a separate server to
dynamic XCF links dynamic XCF links. Links using the cross-system coupling facility hat can be aut
Dynamic-link library Dynamic Link Library. See Dynamic-link library Jump .
dynamic-link library DLL: dynamic-link library
early life support
EB EB. exabyte.
EBCDIC EBCDIC. Extended Binary Coded Decimal Interchange Code.
EBN EBN. extended border node.
e-business e-business. (1) The transaction of business over an electronic medium such as t
EC EC. engineering change.
ECSA ECSA. extended common service area.
Edge Virtual Bridging (Edge Virtual Bridging) An L2 technology that enables hosts to exchange
edge virtual bridging
EDT EDT. eligible device table.
elastic virtual switch (elastic virtual switch) A sofware virtual switch in Oracle Solaris that pro
elastic virtual switch
Electronic Industries Association
element element. In SMP/E, part of a product, such as a macro, module, dialog panel, or
eligible device table eligible device table (EDT). An installation defined representation of the device
Emergency Change Advisory Board
EN EN. end node.
Enables you to control the available bandwidth of a physical NIC on a per-application, per-port, per-protocol, and per-address b
encapsulating security payload (encapsulating security payload) An extension header that provides integ
encapsulating security payload
encapsulation encapsulation. In communications, a technique used by layered protocols by wh
enclave enclave. A transaction that can span multiple dispatchable units (SRBs and tasks
encrypt encrypt. To systematically encode data so that it cannot be read without knowing
end node end node. See Advanced Peer-to-Peer Networking (APPN) end node.
endian endian. An attribute of data representation that reflects how certain multi-octet da
enhanced transmission selection (enhanced transmission selection) A DCB feature that allocates bandwid
enhanced transmission selection
enterprise enterprise. The composite of all operational entities, functions, and resources th
Enterprise Extender Enterprise Extender. A means for sending SNA data over an IP network. Enterp
Enterprise JavaBean EJB: Enterprise JavaBean
Enterprise Systems Connection Enterprise Systems Connection (ESCON). A set of products and services that 
Entity Relationship Diagram
entry area entry area. In z/OS, the part of a console screen where operators can enter com
entry name entry name. In assembler language, a programmer-specified name within a con
entry point entry point. The address or label of the first instruction that is executed when a 
entry point name entry point name. The symbol (or name) that represents an entry point. See en
EOF EOF. End of file.
ephemeral port number ephemeral port number. In some TCP/IP implementations, a temporary port n
equal-cost multi-path (equal-cost multi-path) A routing technique for routing packets along mu
equal-cost multi-path
ER ER. explicit route.
ESCON ESCON. Enterprise Systems Connection.
ESCON channel ESCON channel. A channel that supports ESCON protocols.
ESCON Director ESCON Director (ESCD). A switch for ESCON optical channels that provides con
ESCON Manager ESCON Manager (ESCM). A licensed program that provides host control and int
ESCON multiple image facility ESCON multiple image facility (EMIF). In mainframe computing, a function tha
esoteric esoteric. An installation-defined and named grouping of I/O devices of usually th
e-sourcing capability model for client organizations
e-sourcing capability model for service providers
Ethernet Ethernet. A packet-based networking technology for local area networks (LANs)
ETR ETR. External Time Reference.
European Computer Manufacturers Association
European Telecom Standards Institute
Event Manager EVM: Event Manager
Event Manager Daemon EVMD: Event Manager Daemon
exabyte exabyte. For processor, real and virtual storage capacities and channel volume: 
exception SYSMOD exception SYSMOD. A SYSMOD that is in error or that requires special process
EXCP EXCP. execute channel programs.
executable executable. A load module or program object which has yet to be loaded into me
executable program executable program. (1) A program in a form suitable for execution by a compu
explicit route explicit route. In SNA, a series of one or more transmission groups that connec
Extended Binary-Coded Decimal Interchange Code Extended Binary-Coded Decimal Interchange Code (EBCDIC).  An encoding
extended border node extended border node (EBN). A border node that interconnects: (a) APPN netw
extended MCS console extended MCS console. In z/OS, a console other than an MCS console from w
extended remote copy extended remote copy (XRC). A hardware- and software-based remote copy s
extended service set identifier (extended service set identifier) An electronic marker or identifier that se
extended service set identifier
eXtensible Markup Language XML: eXtensible Markup Language
eXtensible Stylesheet Language XSL: eXtensible Stylesheet Language
eXtensible Stylesheet Language Formatting Object XSLFO: eXtensible Stylesheet Language Formatting Object
Extensible Stylesheet Language Transformation XSLT: Extensible Stylesheet Language Transformation
external network modifier (external network modifier) A profile that is created for applications that
external network modifier
external reference external reference. In an object deck, a reference to a symbol, such as an entry
External Time Reference External Time Reference (ETR). Obsolete term for Sysplex Timer® .
eXtreme Programming
failover failover. (1) A transparent operation that switches to a redundant or standby syst
failure detection time (failure detection time) The amount of time required for detecting wheth
failure detection time
Failure Mode and Effect Analysis
failure modes and effects analysis
fanout fanout. A single output that becomes input to multiple branches.
Fast Application Notification FAN: Fast Application Notification
Fast Ethernet Fast Ethernet. An Ethernet standard that provides a data rate of 100 Mbps.
fault management resource identifier (fault management resource identifier) An identifier for each service, har
fault management resource identifier
fault tree analysis
FDDI FDDI. Fiber Distributed Data Interface.
feature feature. Part of a product that is either included with the product or can be order
feature code feature code. A four-digit code used by IBM to process hardware and software o
Feature driven development - sofware development process. It is one of a number of Agile methods for developing sofware.
Federal Information Processing Standard FIPS: Federal Information Processing Standard
Federal Information Security Management Act —
Federal Trade Commission —
FEP FEP. front-end processor.
fetch fetch. The dynamic loading of a procedure.
FFST FFST. First Failure Support Technology.
Fiber Connection Environment Fiber Connection Environment (FICON®). An optical fiber communication me
Fiber Distributed Data Interface Fiber Distributed Data Interface. An American National Standards Institute (A
fiber link fiber link. The physical fiber optic connections and transmission media between
fiber optic cable fiber optic cable. A fiber or bundle of fibers in a structure built to meet optic, me
Fibre Channel over Ethernet (Fibre Channel over Ethernet) A T11 standard that transports encapsulat
Fibre Channel over Ethernet
fibre-channel connection fibre-channel connection (FICON). A fibre-channel communication protocol de
FICON FICON. fibre channel connection.
FID FID. format identifier.
field-replaceable unit field-replaceable unit (FRU). An assembly that is replaced in its entirety when 
FIFO FIFO. first-in-first-out.
file file. A collection of related data that is stored and retrieved by an assigned name
File Transfer Protocol File Transfer Protocol (FTP). In TCP/IP, an application protocol used for transfe
File Transfer Protocol
FILEDEF FILEDEF. file definition statement.
FIN FIN. no more data from sender.
firewall firewall. (1) A network configuration, usually both hardware and software, that pr
First Failure Support Technology First Failure Support Technology (FFST) dump. A dump produced by First Fa
first-in-first-out first-in-first-out (FIFO). A queuing technique in which the next item to be retriev
fix fix. A correction of an error in a program, usually a temporary correction or bypas
fixed-length record fixed-length record. A record having the same length as all other records with w
FlashCopy® FlashCopy®. A point-in-time copy services function that can quickly copy data fro
FMID FMID. function modification identifier.
Food and Drug Administration
footprint footprint. (1) The amount of computer storage that is occupied by a computer p
foreground foreground. (1) in multiprogramming, the environment in which high-priority prog
foreground job foreground job. (1) A high-priority job, usually a real-time job. (2) Under TSO, a
foreign key foreign key. A column or set of columns in a dependent table of a constraint rela
fork fork. To create and start a child process. Forking is similar to creating an address
format identification field format identification field (FID, FID field). In SNA, a field in each transmissio
Fortran Fortran. A high-level language used primarily for applications involving numeric c
forward explicit route forward explicit route. Explicit routes originating in the host.
forwarding forwarding. The act of moving a datagram between two different networks or su
frame frame. (1) The hardware support structure, covers, and all electrical parts mount
frame relay frame relay. A protocol for routing frames through the network based on the add
Frequently Asked Questions
FRSN FRSN. flow reduction sequence number.
FRU FRU. field-replaceable unit.
FTP FTP. File Transfer Protocol.
FTPD FTPD. FTP daemon.
full screen mode full screen mode. A form of screen presentation in which the contents of an ent
full-duplex full-duplex. See duplex.
fullword fullword. A sequence of bits or characters that comprises four bytes (one word) 
fullword boundary fullword boundary. A storage location whose address is evenly divisible by 4.
function function. In SMP/E, a product (such as a system component or licensed program
Function Count
function modification identifier function modification identifier (FMID). A code that identifies the release lev
Function Point Analysis.
Function point
Function Point
Function verification test
Functional audit
Functional Design Document
GARP VLAN Registration Protocol
gateway gateway. A device or program used to connect networks or systems with differen
gateway node gateway node. A node that is an interface between networks.
Gb Gb. gigabit.
GB GB. gigabyte.
Gbps Gbps. gigabits per second.
GDG GDG. generation data group.
General Attribute Registration Protocol (General Attribute Registration Protocol) A protocol that is used by a clien
General Parallel File System GPFS: General Parallel File System
generalized trace facility generalized trace facility (GTF). In a z/OS environment, a service program tha
generation data group generation data group (GDG). A collection of historically related non-VSAM da
generic generic. A z/OS-defined grouping of devices with similar characteristics. For exa
Generic LAN Driver version 3 (Generic LAN Driver version 3) The GLDv3 framework is a function calls-b
geographic information system GIS: geographic information system
Geographically Dispersed Parallel Sysplex™ Geographically Dispersed Parallel Sysplex™ (GDPS®).  An application that inte
geometric segment LRS segment: geometric segment
Get Started with Windows PowerShell Desired State CDesired State Configuration. See Get Started with Windows PowerShell D
Getting to the CRUX of DNVM, DNU and DNX in ASP.NDot Net Version Manager. See Getting to the CRUX of DNVM, DNU and D
Gigabit Ethernet Gigabit Ethernet. A variation of the Ethernet protocol that is capable of transmit
gigabyte gigabyte. In decimal notation, 1 073 741 824 bytes when referring to memory ca
global access checking global access checking. The ability to allow an installation to establish an in-sto
Global Cache Service GCS: Global Cache Service
Global Cache Service Processes LMSn: Global Cache Service Processes
Global Directory Service GDS: Global Directory Service
global dynamic performance views GV$: global dynamic performance views
Global Enqueue Service GES: Global Enqueue Service
Global Enqueue Service Daemon LMD: Global Enqueue Service Daemon
Global Enqueue Service Monitor LMON: Global Enqueue Service Monitor
global resource serialization global resource serialization. A z/OS function that provides a serialization mec
global resource serialization complex global resource serialization complex. One or more z/OS systems that use gl
Global Services Daemon GSD: Global Services Daemon
global zone global zone. A group of records in a CSI data set used to record information abo
Google Test Analytics
Google Test Automation Conference
Government Open Systems Interconnection Profile
Graphical User Interface
gratuitous ARP gratuitous ARP. An unsolicited ARP response.
Gregorian calendar Gregorian calendar. The calendar in use since Friday, 15 October 1582 through
group group. A collection of RACF users who can share access authorities for protecte
GTF GTF. generalized trace facility.
guest guest. An operating system, such as Linux or z/OS, running in a virtual machine 
GUI GUI. graphical user interface.
half-duplex half-duplex. In data communication, pertaining to transmission in only one direc
handshake handshake. In Transport Layer Security (TLS), the initial setup of a TLS connect
hardcopy log hardcopy log. In systems with multiple console support or a graphic console, a p
hardware hardware. Physical equipment, as opposed to the computer program or method
hardware configuration definition hardware configuration definition (HCD). An interactive interface in z/OS tha
Hardware configuration management
Hardware Management Console Hardware Management Console (HMC). A console used to monitor and cont
Hardware or sofware that isolates an organization's private network or intranet from the Internet, thus protecting it from exte
hardware unit hardware unit. A central processor, storage element, channel path, device, and
hash-based message authentication code (hash-based message authentication code) A keyed hashing method for
hash-based message authentication code
HASP HASP. Houston Automatic Spooling Priority.
HCD HCD. hardware configuration definition.
head of string head of string. The first unit of devices in a string. It contains the string interface
Healthcare Portability and Accountability Act of 1996
heat sink heat sink. A metal base or plate onto which one or more components are mounte
hexadecimal hexadecimal. A base 16 numbering system. Hexadecimal digits range from 0 th
HFS HFS. hierarchical file system.
hierarchical file system hierarchical file system (HFS) data set. A data set that contains a POSIX-com
Hierarchy, Input, Processing, Output
High Availability Cluster Multi-Processing HACMP: High Availability Cluster Multi-Processing
Higher Order Logic
high-level language high-level language (HLL). A programming language above the level of assemb
highly parallel highly parallel. Refers to multiple systems operating in parallel, each of which c
HiperSockets™ HiperSockets™. A technology that provides high-speed TCP/IP connectivity with
HLL HLL. high-level language.
HMC HMC. Hardware Management Console.
HOLDDATA HOLDDATA. In SMP/E, one or more MCSs used to indicate that certain SYSMOD
hop hop. In APPN, a portion of a route that has no intermediate nodes. It consists of o
host host. A computer that is connected to a network and provides an access point to
host bus adapter HBA: host bus adapter
hot plug hot plug. To install a hardware component without turning off the system.
hot-swap hot-swap. Pertaining to a device that is capable of being replaced while the syst
Houston Automatic Spooling Priority Houston Automatic Spooling Priority (HASP). A computer program that provi
HPR HPR. high performance routing.
HTTP HTTP. Hypertext Transfer Protocol.
HTTP server HTTP server. A program that enables a computer that uses the Hypertext Transf
hub hub. In a network, a point at which circuits are either connected or switched. For
I/O I/O. Input/output.
I/O cage I/O cage. A physical area of the processor frame where connections to the centr
I/O cluster I/O cluster. A sysplex that owns a managed channel path for a logically partitione
I/O device I/O device. A printer, tape drive, hard disk drive, and so on. Devices are logically
IAC IAC. Interpret As Command.
IBM IBM. International Business Machines Corporation.
IBM Security Server IBM Security Server. An IBM licensed program that provides access control by 
IBM Support Center IBM Support Center. The IBM organization responsible for software service.
IBM systems engineer IBM systems engineer (SE). An IBM service representative who performs main
ICMP ICMP. Internet Control Message Protocol.
ICN ICN. interchange network node.
ICSF ICSF. Integrated Cryptographic Service Facility.
IDCAMS IDCAMS. An IBM program used to process access method services commands. 
identity association (identity association) The method used for a server and a client to identi
identity association
identity association identifier (identity association identifier) An identifier that is used to identify the in
identity association identifier
IDS IDS. intrusion detection services.
IEEE IEEE. Institute of Electrical and Electronic Engineers.
iet IETF. I nternet Engineering Task Force.
IKE IKE. Internet Key Exchange.
image image. A single instance of the z/OS operating system.
IMS IMS. Information Management System.
IMS DB IMS DB. Information Management System Database Manager.
IMS DB data sharing group IMS DB data sharing group. A collection of one or more concurrent IMS DB su
In a computer network, a node is a connection point or an end point for the transmission of the data.
In a router, to inform a host of a better first-hop node to reach a particular destination.
In IPQoS, the action to take as a result of metering traffic. The IPQoS meters have three outcomes: red, yellow, and green. You
In networking, a method that is used to transmit packets simultaneously to every system on a subnet except the sender. Broad
independent LU independent LU. See SSCP-independent LU.
Information Management System Information Management System (IMS). Any of several system environments
information security management
information security management system
information technology
Information Technology Infrastructure Library.
Infrastructure as a Service
initial program load initial program load (IPL). The initialization procedure that causes the z/OS ope
initial storage allocation initial storage allocation. The amount of central and expanded storage to be as
initiator initiator. That part of an operating system that reads and processes operation co
initiator/terminator initiator/terminator. The job scheduler function that selects jobs and job steps 
input/output input/output. Pertaining to a device, process, channel, or communication path 
input/output configuration data set input/output configuration data set (IOCDS).  A file that contains different con
input/output definition file input/output definition file (IODF). A VSAM linear data set that contains I/O d
Input-Process-Output
install install. In SMP/E, to apply a SYSMOD to the target libraries or to accept a SYSM
installation exit installation exit. The means by which an IBM software product may be modified
Institute of Electrical and Electronics Engineers
instruction line instruction line. In z/OS, the part of the console screen that contains messages
Instructions that tell a modem how to establish a communications link between itself and a remote peer. Both the PPP and UU
Integrated Development Environment IDE: Integrated Development Environment
Integrated Development Environment
Integrated Services Digital Network Integrated Services Digital Network (ISDN). An international communications
Integrated Services Digital Network terminal adaptor (Integrated Services Digital Network terminal adaptor) A signal-adapting
Integrated Services Digital Network terminal adaptor
Integrated Services Digital Network
Integrated Sofware Lifecycle Environment
interactive interactive. Pertaining to a program or system that alternately accepts input and
interactive problem control system interactive problem control system (IPCS). A component of z/OS that permits
Interactive System Productivity Facility Interactive System Productivity Facility (ISPF).  A dialog manager for interacti
interactive voice response
interchange node interchange node. (1) A node that acts as both an APPN network node and a ty
Interface design document
Interface design language
internal rate of return
internal reader internal reader. A facility that transfers jobs to JES.
International Electrotechnical Commission
International Organization for Standardization
International Organization for Standards
Internet Internet. The worldwide collection of interconnected networks that use the Intern
Internet Assigned Numbers Authority (Internet Assigned Numbers Authority) An organization that delegates re
Internet Assigned Numbers Authority
Internet Bootstrap Protocol (Internet Bootstrap Protocol) A protocol that is used by a network client
Internet Bootstrap Protocol
Internet Control Message Protocol (Internet Control Message Protocol) A protocol that is used to detect and
Internet Control Message Protocol
Internet Control Message Protocol Internet Control Message Protocol (ICMP). An Internet protocol that is used 
Internet Inter-ORB Protocol IIOP: Internet Inter-ORB Protocol
Internet key exchange (Internet key exchange) IKE automates the provision of authenticated ke
Internet key exchange
Internet Protocol Internet Protocol (IP). A protocol that routes data through a network or intercon
Internet Protocol Control Protocol (Internet Protocol Control Protocol) A subprotocol of PPP that negotiates
Internet Protocol Control Protocol
Internet Protocol Security
Internet Protocol Version 6 Control Protocol
Internet Protocol, version 4 (Internet Protocol, version 4) A version of the internet protocol that supp
Internet Protocol, version 4
Internet Protocol, version 6 (Internet Protocol, version 6) A version of the internet protocol that supp
Internet Protocol, version 6
Internet registry (Internet registry) A registry that contains registration information of Inte
Internet registry
Internet relay chat
Internet Security Association and Key Management Pr(Internet Security Association and Key Management Protocol) A common
Internet Security Association and Key Management Protocol
Internet Security Association and Key Management Protocol
internet service provider
Interprocess Communication IPC: Interprocess Communication
interrupt interrupt. A suspension of a process, such as the execution of a computer progr
intranet intranet. A private network that integrates Internet standards and applications (s
Introduction to Collaborative Application Markup Lan Collaborative Application Markup Language. An XML based markup langu
Introduction to Data Quality Services Data Quality Services. See Introduction to Data Quality Services Jump .
intrusion detection service intrusion detection service. Software that detects attempts or successful attac
IOCDS IOCDS. input/output configuration data set.
IOCP IOCP. input/output configuration program.
IODF IODF. input/output definition file.
IOP IOP. input/output program.
IP address IP address. The unique 32-bit address (or, for IP version 6, the 128-bit address) 
IP layer IP layer. Synonym for network layer.
IP Multipathing (IP Multipathing) A Layer 3 (L3) technology that ensures that a system ha
IP Multipathing
IP network IP network. A network that consists of subnetworks that are connected through 
IP Quality of Service (IP Quality of Service) A sofware feature that provides an implementatio
IP Quality of Service
IP route IP route. A network path between any two IP addressable points in a network.
IP security (IP security) The security architecture that provides protection for IP com
IP security
IP Security Architecture IP Security Architecture. A collection of Internet Engineering Task Force (IETF)
IP IP . Internet Protocol.
IPA IPA. IP network availability.
IPCS IPCS. Interactive Problem Control System.
IPL IPL. initial program load.
IPSec IPSec. IP Security.
IPv4 IPv4. Internet Protocol version 4.
IPv6 IPv6. Internet Protocol Version 6.
IQDIO IQDIO. Internal Queued Direct I/O.
ISC ISC. inter-system coupling.
ISDN ISDN. Integrated Services Digital Network.
ISMF ISMF. Interactive storage management facility.
ISPF ISPF. Interactive System Productivity Facility.
ISPF/PDF ISPF/PDF. Interactive System Productivity Facility/Program Development Facility.
IT service continuity management
IT service management
IT Service Management Forum
IT Steering Group
ITIL
ITSO ITSO. International Technical Support Organization.
IVP IVP. installation verification procedure.
Java 2 Platorm, Enterprise Edition J2EE: Java 2 Platorm, Enterprise Edition
Java API for XML Processing JAXP: Java API for XML Processing
Java Architecture for XML Binding JAXB: Java Architecture for XML Binding
Java Database Connectivity JDBC: Java Database Connectivity
Java Developer's Kit JDK: Java Developer's Kit
Java Naming and Directory Interface JNDI: Java Naming and Directory Interface
Java Runtime Environment JRE: Java Runtime Environment
Java Specification Request JSR: Java Specification Request
Java Virtual Machine JVM: Java Virtual Machine
JavaServer Pages JSP: JavaServer Pages
JCL JCL. job control language.
JES JES. job entry subsystem.
JES2 JES2. A z/OS subsystem that receives jobs into the system, converts them to inte
JES3 JES3. A z/OS subsystem that receives jobs into the system, converts them to inte
job job. A unit of work for an operating system. Jobs are defined by JCL statements.
job class job class. Any one of a number of job categories that can be defined. With the cla
job control language job control language (JCL). A sequence of commands used to identify a job to a
job control language job control language (JCL) statements. Statements placed into an input stream
job entry subsystem job entry subsystem (JES). A system facility for spooling, job queueing, and ma
job priority job priority. A value assigned to a job that is used as a measure of the job's rela
job separator pages job separator pages. Those pages of printed output that delimit jobs.
job step job step. The job control (JCL) statements that request and control execution of 
Joint Application Development
Joint Technical Committee 1
Julian date Julian date. A date format that contains the year in positions 1 and 2, and the da
jumper cable jumper cable. Fiber used to make mutable connections between patchports.
Kb Kb. kilobit.
KB KB. kilobyte.
Kbps Kbps. Kilobits per second.
kernel kernel. The part of an operating system that performs basic functions such as all
Key Distribution Center KDC: Key Distribution Center
key performance indicator
key ring key ring. In computer security, a file that contains public keys, private keys, truste
Key Word in Context KWIC: Key Word in Context
key-sequenced data set key-sequenced data set (KSDS). A VSAM file or data set whose records are loa
keyword keyword. A part of a command operand that consists of a specific character strin
Knowledge-Based Sofware Assistant
known error database
KSDS KSDS. key-sequenced data set.
LAN LAN. local area network.
LAN segment LAN segment. (1) Any portion of a LAN (for example, a bus or ring) that can ope
Language Environment Language Environment. Short form of z/OS Language Environment. A set of ar
Large Object LOB: Large Object
Large Objects LOBs: Large Objects
large receive offload (large receive offload) A technology that merges successive incoming pac
large receive offload
last-in-first-out last-in-first-out (LIFO). A queuing technique in which the next item to be retrieve
LCSS LCSS. logical channel subsystem.
LCU LCU. logical control unit.
LDAP LDAP. Lightweight Directory Access Protocol.
LDAP Data Interchange Format LDIF: LDAP Data Interchange Format
LEN node LEN node. low-entry network (LEN) node.
library library. A partitioned data set (PDS) that contains a related collection of named m
LIC LIC. Licensed Internal Code.
licensed internal code licensed internal code (LIC). Microcode that IBM does not sell as part of a mac
licensed program licensed program. A software package that can be ordered from the program lib
LIFO LIFO. last-in-first-out.
Lightweight Directory Access Protocol (Lightweight Directory Access Protocol) A client-server protocol that is us
Lightweight Directory Access Protocol LDAP: Lightweight Directory Access Protocol
Lightweight Directory Access Protocol
Lightweight Directory Access Protocol Lightweight Directory Access Protocol (LDAP). An Internet protocol standard
line of service
line switching line switching. Synonym for circuit switching.
Linear Code Sequence And Jump
Lines of code
link link. In data communications, a transmission medium and data link control comp
Link Aggregation Control Protocol (Link Aggregation Control Protocol) An IEEE 802.3ad standard for dynami
Link Aggregation Control Protocol
Link Control Protocol (Link Control Protocol) A subprotocol of PPP that is used to negotiate the
Link Control Protocol
link layer link layer. See data link layer .
Link Layer Discovery Protocol (Link Layer Discovery Protocol) A link layer protocol that enables network
Link Layer Discovery Protocol
link library link library. A data set containing link-edited object modules.
link pack area link pack area (LPA). An area of virtual storage that contains reenterable routine
link state link state. In routing protocols, the advertised information about the usable interf
link station link station. In SNA, a named resource within an APPN or a subarea node that r
linkage editor linkage editor. An operating system component that resolves cross-references b
linked list linked list. A list in which the data elements may be dispersed but in which each 
link-edit link-edit. To create a loadable computer program by means of a linkage editor o
list structure list structure. A coupling facility structure that enables multisystem applications 
little endian little endian. A format for storage of binary data in which the least significant byt
LLC LLC. logical link control.
LMOD LMOD. In SMP/E, an abbreviation for load module.
load balancing load balancing. The monitoring and management of the workload on servers. If 
load module load module. An executable program stored in a partitioned data set program lib
load modules Libraries containing load modules
local area network local area network (LAN). A network that connects several devices in a limited 
local system queue area local system queue area (LSQA). In z/OS, one or more segments associated w
local topology database local topology database. A database in an APPN or LEN node containing an en
Locate search Locate search. The means which directory services in a node uses to find a reso
lock structure lock structure. A coupling facility structure that enables applications in a sysplex
log writer process LGWR: log writer process
logical change record LCR: logical change record
logical channel subsystem logical channel subsystem (LCSS). A channel subsystem structure that provide
logical control unit logical control unit (LCU). A single control unit (CU) with or without attached de
logical partition logical partition (LPAR). A subset of a single system that contains resources (p
logical partitioning logical partitioning. A function of an operating system that enables the creation
logical subsystem logical subsystem. The logical functions of a storage controller that allow one or
logical unit logical unit (LU). An access point through which a user or application program a
Logical Unit Number LUN: Logical Unit Number
logical unit numbers LUNs: logical unit numbers
logical unit type 6.2 logical unit type 6.2. The SNA logical unit type that supports general communic
Logical Volume Manager LVM: Logical Volume Manager
logically partitioned logically partitioned (LPAR) mode. A central processor complex (CPC) power-
logoff logoff. (1) The procedure by which a user ends a terminal session. (2) In VTAM, 
logon logon. (1) The procedure by which a user begins a terminal session. (2) In VTAM
LOGREC LOGREC. Log recording data set.
Long-Sequence Regression Testing
loop loop. A situation in which an instruction or a group of instructions execute repeat
loosely coupled loosely coupled. A multisystem structure that requires a low degree of interactio
low entry networking low entry networking (LEN) node. A node that provides a range of end-user s
Lower control limit
LP LP. logical partition.
LPA LPA. link pack area.
LPAR LPAR. logically partitioned (mode).
LRECL LRECL. logical record length.
LSPR LSPR. Large System Performance Reference.
LSQA LSQA. local system queue area
LU LU. logical unit.
LU-LU session LU-LU session. A logical connection between two logical units (LUs) in an SNA n
M - MUST have this; S - SHOULD have this if at all possible; C - COULD have this if it does not affect anything else; W - WON'T h
MAC MAC. media access control (MAC).
MAC address MAC address. A standardized data link layer address required for every port or d
machine check interruption machine check interruption. An interruption that occurs as a result of an equip
machine readable machine readable. Pertaining to data a machine can acquire or interpret (read)
macro macro. An instruction in a source language that is to be replaced by a defined se
macro instruction macro instruction. Obsolete term for macro.
main task main task. In the context of z/OS multitasking, the main program in a multitaskin
mainframe mainframe. A computer, usually in a computer center, with extensive capabilities
major node major node. In VTAM, a set of resources that can be activated and deactivated 
management of risk
MAS MAS. multi-access spool configuration.
master catalog master catalog. A catalog that contains extensive data set and volume informati
master IODF master IODF. A centrally kept IODF containing I/O definitions for several systems
master trace master trace. A centralized data tracing facility of the master scheduler, used in 
maximum transmission unit (maximum transmission unit) The size of the largest data unit, given in oc
maximum transmission unit
Mb Mb. megabit.
MB MB. megabyte.
Mbps Mbps. megabits per second.
MCS MCS. (1) Multiple console support. (2) Modification control statement (in SMP/E).
MCS console MCS console. A non-SNA device defined to z/OS that is locally attached to a z/O
MDH MDH. migration data host.
Mean Time Between Failure
mean time between failures
mean time between service incidents
Mean time to critical failure
Mean Time To Fail
Mean Time To Recover MTTR: Mean Time To Recover
mean time to repair
Mean Time To Repair
mean time to restore service
media access control media access control (MAC). In LANs, the sublayer of the data link control laye
Media Access Control address (Media Access Control address) An unique address that is assigned to a n
megabyte megabyte (MB). 220 bytes, 1 048 576 bytes.,048,576 bytes.
member member. A partition of a partitioned data set (PDS) or partitioned data set extend
memory dump memory dump. Synonymous with dump .
message processing facility message processing facility (MPF). A facility used to control message retentio
message queue message queue. A queue of messages that are waiting to be processed or waiti
message text message text. The part of a message consisting of the actual information that is
messaging application programming interface MAPI: messaging application programming interface
metropolitan area network metropolitan area network (MAN). A network formed by the interconnection 
microcode microcode. Stored microinstructions, not available to users, that perform certain
microprocessor microprocessor. A processor implemented on one or a small number of chips.
Microsof Advanced Group Policy Management Microsof Advanced Group Policy Management. Tool to manage Group P
Microsof Application Virtualization Microsof Application Virtualization. See Microsof App-V Jump .
Microsof Business Connectivity Services Business Connectivity Services. A SharePoint feature. Formerly called Bu
Microsof Case Studies Disaster Recovery as a Service. See Microsof Case Studies Jump .
Microsof CHAP (Microsof CHAP) A proprietary Microsof authentication protocol for PPP
Microsof CHAP
Microsof Distributed Transaction Coordinator MS DTC: Microsof Distributed Transaction Coordinator
Microsof SQL Server and SQL Server Database Enginethe SQL Server DataBase Engine. See Microsof SQL Server Jump and SQL
MIF MIF. multiple image facility.
migration migration. Refers to activities, often performed by the system programmer, that 
migration data host migration data host. A node that acts as both an APPN end node and a type 5 
minimum bounding rectangle MBR: minimum bounding rectangle
Ministry of Defence —
minor node minor node. In VTAM, a uniquely defined resource within a major node.
mixed complex mixed complex. A global resource serialization complex in which one or more o
MLTG MLTG. multilink transmission group.
MNLB MNLB. multi-node load balancing.
Model-driven development
modem modem (modulator-demodulator). A device that converts digital data from a 
modification control statement modification control statement (MCS). An SMP/E control statement used to p
modification level modification level. A distribution of all temporary fixes that have been issued sin
module module. The object that results from compiling source code. A module cannot be
Monitor I, II, III Monitor I, II, III. Components of the Resource Measurement Facility (RMF™).
monoplex monoplex. A sysplex consisting of one system that uses a sysplex couple data s
MPC MPC. multipath channel.
MSU MSU. million service units. See service unit.
MTU MTU. maximum transmission unit.
multi-access spool configuration multi-access spool configuration. Multiple systems sharing the JES2 input, job
multicast multicast. (1) Transmission of the same data to a selected group of destinations
multiple console support multiple console support (MCS). The operator interface in a z/OS system.
multiple image facility multiple image facility (MIF). A facility that allows multiple logical partitions to 
Multiple Virtual Storage Multiple Virtual Storage (MVS). An earlier form of the z/OS operating system.
multiplexer channel multiplexer channel. A channel designed to operate with a number of I/O devic
multiprocessing multiprocessing. The simultaneous execution of two or more computer program
multiprocessor multiprocessor (MP). A CPC that can be physically partitioned to form two ope
multisystem application multisystem application. An application program that has various functions dis
multisystem console support multisystem console support. Multiple console support for more than one syst
multisystem environment multisystem environment. An environment in which two or more z/OS images
multisystem sysplex multisystem sysplex. A sysplex in which two or more z/OS images are allowed 
multitasking multitasking. Mode of operation that provides for the concurrent, or interleaved,
mutable connection mutable connection. Connections made with fiber jumper cables between patc
MVS MVS. Multiple Virtual Storage.
MVS/ESA MVS/ESA. Multiple Virtual Storage/Enterprise Systems Architecture.
name server name server. In the Internet suite of protocols, synonym for domain name serv
nanosecond nanosecond (ns). One billionth of a second; a common measurement of read or
National British standard
National Character Large Object NCLOB: National Character Large Object
National Cyber Security Alliance
National Institute of Standards and Technology NIST: National Institute of Standards and Technology
National Institute of Standards and Technology
NAU NAU. Network accessible unit.
NCP NCP. Network Control Program.
net present value
network network. In data communications, a configuration in which two or more locations
network accessible unit network accessible unit (NAU). A logical unit (LU), physical unit (PU), control p
network address translation (network address translation) The translation of an IP address used withi
network address translation
network administrator network administrator. A person who manages the use and maintenance of a 
Network Attached Storage NAS: Network Attached Storage
network configuration profile (network configuration profile) The profiles that manage the system's ne
network configuration profiles
network configuration unit (network configuration unit) An individual configuration object that cont
network configuration unit
network controller network controller. A concentrator and protocol converter used with SDLC links
Network File System (Network File System) A file system protocol that is used to remotely acc
Network File System Network File System. A component of z/OS that allows remote access to z/OS 
Network File System NFS: Network File System
Network File System
network hardware technician network hardware technician. A person with specific skills and tools for suppo
network ID network ID. (1) In TCP/IP, that part of the IP address that defines a network. (2) 
network information service (network information service) A distributed network database containing
Network Information Service NIS: Network Information Service
network information service
Network Interface NI: Network Interface
network interface card (network interface card) A network adapter card that connects a comput
Network Interface Card NIC: Network Interface Card
network interface card
network interface card network interface card (NIC). A printed circuit board that plugs into a personal
network job entry network job entry (NJE). A JES2 facility that provides for the passing of selecte
network layer network layer. In Open Systems Interconnection (OSI) architecture, the layer th
network node network node (NN). See Advanced Peer-to-Peer Networking (APPN) netwo
network node server network node server. An APPN network node that provides network services fo
network operator network operator. (1) A person who controls the operation of all or part of a net
Network Program Interface NPI: Network Program Interface
network protocol network protocol. A communications protocol from the network layer of the Op
Network Session NS: Network Session
Network Time Protocol (Network Time Protocol) A protocol that is used to set and maintain the
Network Time Protocol NTP: Network Time Protocol
Network Time Protocol
network topology database network topology database. The representation of the current connectivity bet
next sequential instruction next sequential instruction. The next instruction to be executed in the absence
NFS NFS. network file system.
NFTP NFTP. NetView® File Transfer.
NHDR NHDR. network layer header.
NIC NIC. network interface card.
NIP NIP. nucleus initialization program
NLP NLP. network layer packet.
NN NN. network node.
Nonfunctional requirements
nonpageable region nonpageable region. In z/OS, a subdivision of the nonpageable dynamic area t
nonreentrant nonreentrant. A type of program that cannot be shared by multiple users.
nonstandard labels nonstandard labels. Labels that do not conform to American National Standard
NPM NPM. NetView Performance Monitor.
NTBackup Backup File. Proprietary files created by the Windows NT Backup Utility (
nucleus nucleus. That portion of a control program that always remains in central storage
nucleus initialization program nucleus initialization program (NIP). The stage of z/OS that initializes the con
null null. Empty; having no meaning.
numerics Numerics
n-way n-way. The number (n) of CPs in a CPC. For example, a 6-way CPC contains six
OAF OAF. origin address field.
object deck object deck. A module that is the output from a language translator (such as a c
object decks Libraries containing object decks, with or without linkage editor control s
Object Link Manager OLM: Object Link Manager
Object Relationship Diagram
Object Request Broker ORB: Object Request Broker
Objectives and key results
Occurs when a packet travels from a source to a destination in a path but takes a different path while returning to the source. C
Office of Government Commerce
Office of Public Sector Information
offline offline. Pertaining to equipment or devices not under control of the processor.
offset offset. The number of measuring units from an arbitrary starting point in a record
OLTP OLTP. online transaction processing.
OLU OLU. originating logical unit.
OMPROUTE server OMPROUTE server. The routing daemon on z/OS capable of handling both OSP
On NICs, receive
online online. Pertaining to a user's ability to interact with a computer.
online transaction processing OLTP: online transaction processing
Open Shortest Path First Open Shortest Path First (OSPF). In the Internet suite of protocols, a function t
Open Systems Adapter Open Systems Adapter (OSA). An integrated IBM mainframe hardware feature
Open Systems Interconnection OSI: Open Systems Interconnection
Open Systems Interconnection Open Systems Interconnection (OSI). The interconnection of open systems in
Open Systems Interconnection model (Open Systems Interconnection model) A standard model designed by th
Open Systems Interconnection model
Open Systems Interconnection
OpenSSH OpenSSH. Open Secure Shell.
operating system operating system. Software that controls the running of programs; in addition, a
Operational configuration management
operational expenditure
operational level agreement
operations log operations log. In z/OS, the operations log is a central record of communication
operator commands operator commands. Statements that system operators an use to get informati
operator message operator message. A message from an operating system directing the operator
Optimal Flexible Architecture OFA: Optimal Flexible Architecture
Oracle Call Interface OCI: Oracle Call Interface
Oracle Cluster File System OCFS: Oracle Cluster File System
Oracle Cluster Registry OCR: Oracle Cluster Registry
Oracle Data Provider for .NET ODP.NET: Oracle Data Provider for .NET
Oracle Enterprise Manager Configuration Assistant EMCA: Oracle Enterprise Manager Configuration Assistant
Oracle Hardware Assisted Resilient Data HARD: Oracle Hardware Assisted Resilient Data
Oracle Interface Configuration Tool OIFCFG: Oracle Interface Configuration Tool
Oracle Managed Files OMF: Oracle Managed Files
Oracle Notification Services ONS: Oracle Notification Services
Oracle Objects for OLE OO4O: Oracle Objects for OLE
Oracle Open Database Connectivity ODBC: Oracle Open Database Connectivity
Oracle Program Interface OPI: Oracle Program Interface
Oracle Services for Microsof Transaction Server OraMTS: Oracle Services for Microsof Transaction Server
Oracle Solaris Integrated Load Balancer (Oracle Solaris Integrated Load Balancer) An L3 and L4 technology that e
Oracle Solaris Integrated Load Balancer
Oracle Solaris Key Management Framework (Oracle Solaris Key Management Framework) A framework that provides
Oracle Solaris Key Management Framework
Oracle System Identifier SID: Oracle System Identifier
Oracle XML Developer's Kit XDK: Oracle XML Developer's Kit
ORB ORB. operation request block.
Ordered Collection in Tables OCT: Ordered Collection in Tables
Organization for the Advancement of Structured Infor OASIS: Organization for the Advancement of Structured Information
OS/390 OS/390. An earlier form of the z/OS operating system.
OSA OSA. Open Systems Adapter.
oscillator oscillator. A circuit within a computer that creates a series of pulses that pace the
OSI OSI. Open Systems Interconnection.
OSN OSN. OSA for NCP.
OSPF OSPF. Open Shortest Path First.
output group output group. A set of a job's output data sets that share output characteristics,
output writer output writer. A part of the job scheduler that transcribes specified output data s
overlay overlay. To write over existing data in storage.
Overview of Desired Configuration Management Desired Configuration Management. See Overview of Desired Configurati
packet packet. In data communication, a sequence of binary digits, including data and c
packet header
packet mode operation packet mode operation. See packet switching.
packet switching packet switching. (1) The process of routing and transferring data by means of 
page page. (1) In virtual storage systems, a fixed-length block of instructions, data, or 
page fault page fault. In z/OS, a program interruption that occurs when a page that is mark
pageable region pageable region. In z/OS, a subdivision of the pageable dynamic area that is al
paging paging. In z/OS, the process of transferring pages between central storage and e
paging device paging device. In z/OS, a direct access storage device on which pages are store
parallel channel parallel channel. A channel having a System/360™ and System/370 channel-to
parallel OEMI parallel OEMI. A reference to an older IBM standard for a computer peripheral in
parallel processing parallel processing. The simultaneous processing of units of work by many serv
Parallel Sysplex Parallel Sysplex. A sysplex that uses one or more coupling facilities.
parameter parameter. A value or reference passed to a function, command, or program tha
paravirtualized NIC
parmlib parmlib. All the members in the SYS1.PARMLIB data set that contain parameter
parmlib member parmlib member. A member in the SYS1.PARMLIB data set.
Parsed Character Data PCDATA: Parsed Character Data
partially qualified data set name partially qualified data set name. A data set name in which the qualifiers are n
partitionable CPC partitionable CPC. A CPC that can be divided into two independent CPCs. See 
partitioned data set partitioned data set (PDS). A data set in direct access storage that is divided in
partitioned data set extended partitioned data set extended (PDSE). A system-managed data set that conta
partitioning partitioning. The process of forming multiple configurations from one configurat
password password. A unique string of characters known to a computer system and to a u
password authentication protocol (password authentication protocol) An authentication protocol that can b
password authentication protocol
patch panel patch panel. A hardware assembly of port locations in a communications system
patchport patchport. A pair of fibre adapters or couplers. Any number of patchports can pa
path information unit path information unit (PIU). A message unit consisting of a transmission head
pattern of business activity
PC PC. personal computer.
PCHID PCHID. physical channel identifier.
PCOM PCOM. IBM Personal Communications.
PE PE. See program error PTF .
peer network peer network. A network in which every resource is self-contained and controls
peer-to-peer remote copy peer-to-peer remote copy (PPRC). Direct connection between DASD controlle
percolate percolate. The action taken by the condition manager when the returned value f
perfect forward secrecy (perfect forward secrecy) In PFS, the key that is used to protect transmiss
perfect forward secrecy
performance administration performance administration. The process of defining and adjusting workload 
Performance and Coverage Analysis
per-hop behavior (per-hop behavior) A priority that is assigned to a traffic class of a packet
per-hop behavior
peripheral border node peripheral border node. A border node that interconnects adjacent APPN netw
peripheral component interconnect express (peripheral component interconnect express) A serial I/O bus that conne
peripheral component interconnect express
peripheral device peripheral device. The equipment that can communicate directly with a particul
peripheral node peripheral node. A node that uses local addresses for routing and therefore is n
peripheral subnetwork boundary peripheral subnetwork boundary. A connection over a subnetwork boundary 
permanent connection permanent connection. Permanent connections are usually made between ca
permanent data set permanent data set. A user-named data set that is normally retained for longer
Personal Information Protection and Electronic Documents Act
PFK PFK. program function key.
PFK capability PFK capability. On a display console, indicates that program function keys are s
Physical audit
physical channel ID physical channel ID (PCHID). A number assigned by the machine to a physical
physical channel identifier physical channel identifier (PCHID). The physical address of a channel path in
physical function (physical function) A PCI function that supports the SR-IOV capabilities as
physical function
physical layer physical layer. In the Open Systems Interconnection reference model, the layer 
physical partition physical partition. Part of a CPC that operates as a CPC in its own right, with it
physical unit physical unit (PU). In SNA, one of three types of network addressable units. A p
physically partitioned physically partitioned (PP) mode. The state of a processor complex when its h
PIN PIN. personal identification number.
PIU PIU. path information unit.
PL/I PL/I. A general purpose scientific/business high-level language. PL/I is a powerfu
Plan–Do–Check–Act
platorm platorm. The operating system environment in which a program runs.
Platorm as a Service
Platorm-Independent Model
Platorm-independent model
Platorm-Specific Implementation
PLPA PLPA. pageable link pack area.
PLU PLU. primary logical unit.
point of presence point of presence. A system that has been identified as a contact point for anot
pointer pointer. An address or other indication of location.
point-to-multipoint network point-to-multipoint network. A network in which there are many hosts directly
point-to-point network point-to-point network. Pertaining to data transmission between two locations
Point-to-Point Protocol (Point-to-Point Protocol) A link layer protocol that provides a standard m
Point-to-Point Protocol
policy policy. A set of rules that are applied to managed resources.
port port. An access point for data entry or exit.
port number port number. The part of a socket address that identifies a port within a host.
port VLAN identifier (port VLAN identifier) The default VLAN ID that is assumed for untagged
port VLAN identifier
portability portability. The ability to transfer an application from one platform to another wit
Portable Operating System Interface Portable Operating System Interface (POSIX). Portable Operating System Int
PoS PoS. point-of-sale.
POSIX POSIX. Portable Operating System Interface.
Postimplementation review
post-implementation review
Power- On Self - Test
power-on reset power-on reset. A key sequence that restarts the operating system (or other pro
PPP is composed of a number of subprotocols, including PAP, CHAP, LCP, and CCP. PPP over Ethernet
PPP over Ethernet (PPP over Ethernet) A protocol that enables hosts to run PPP sessions ov
PPRC PPRC. peer-to-peer remote copy.
PPT PPT. program properties table.
Precision Time Protocol (Precision Time Protocol) An IEEE protocol that is used to synchronize the
Precision Time Protocol
Preliminary design review
preprocessor preprocessor. A routine that examines application source code for preprocessor
prerequisite for success
preventive service preventive service. (1) The mass installation of PTFs to avoid rediscoveries of t
preventive service planning preventive service planning (PSP). Installation recommendations and HOLDD
primary key primary key. One or more characters within a data record used to identify the da
printer printer. A device that writes output data from a system on paper or other media.
priority-based flow control (priority-based flow control) A datalink level flow control mechanism. PF
priority-based flow control
private VLAN (private VLAN) A subdivision of a VLAN to isolate network traffic. PVLAN
private VLAN
Probability of Failure
Problem and Change Request Tracking System
Problem Management Problem Management. Problem Management investigates the underlying caus
Problem Ticket
Problem trouble report
procedure procedure. A set of self-contained high-level language (HLL) statements that pe
processor processor. The physical processor, or machine, has a serial number, a set of cha
processor controller processor controller. Hardware that provides support and diagnostic functions f
Processor Resource/Systems Manager™ Processor Resource/Systems Manager™ (PR/SM). The feature that allows th
processor storage processor storage. Synonymous with central storage.
production system production system. A system where application programs that are already deve
profile profile. Data that describes the significant characteristics of a user, a group of us
program and project management
program error PTF program error PTF (PE-PTF). A PTF that has been found to contain an error. A P
Program Evaluation and Review technique Diagram
program fetch program fetch. A program that prepares programs for execution by loading them
program function key program function key (PFK). A key on the keyboard of a display device that pa
program global area PGA: program global area
program interruption program interruption. The interruption of the execution of a program due to so
program level program level. The modification level, release, version, and fix level.
program library program library. A partitioned data set or PDSE that always contains named me
program management program management. The task of preparing programs for execution, storing t
program mask program mask. In bits 20 through 23 of the program status word (PSW), a 4-bit 
program module program module. The output of the binder. A collective term for program object 
program number program number. The seven-digit code (in the format xxxx-xxx) used by IBM to
program object program object. All or part of a computer program in a form suitable for loading
program status word program status word (PSW). A 64-bit structure in central storage used to contr
program temporary fix program temporary fix (PTF). A temporary solution or bypass of a problem dia
Project Management Body of Knowledge
projected service availability
projected service outage
PRojects IN Controlled Environments
protocol protocol. The meaning of, and the sequencing rules for, requests and responses
protocol stack protocol stack. A set of network protocol layers and software that work together
protocol suite protocol suite. A set of protocols that cooperate to handle the transmission task
PSH PSH. push data function.
PSP PSP. preventive service planning.
PSS PSS. process scheduling services.
PSW PSW. program status word.
PTF PTF. program temporary fix.
PU PU. physical unit.
public key infrastructure (public key infrastructure) A system of digital certificates, CAs, and other
public key infrastructure PKI: public key infrastructure
public key infrastructure
PUT PUT. program update tape.
QDIO QDIO. queued direct I/O.
QSAM QSAM. queued sequential access method.
qualified name qualified name. A data set name consisting of a string of names separated by p
qualifier qualifier. A modifier in a qualified name other than the rightmost name. For exam
quality assurance
Quality Assurance
Quality Control
Quality Evaluation System
Quality Management System
quality management system
Quality of Service
queue queue. A line or list formed by items in a system waiting for processing.
queued direct I/O queued direct I/O (QDIO). A hardware channel architecture for direct data exc
queued sequential access method queued sequential access method (QSAM).  An extended version of the basic
RACF RACF. Resource Access Control Facility.
raised floor raised floor. Total area of controlled-access space devoted to a company's comp
Rapid Application Development
RAS RAS. reliability, availability, serviceability.
RDW RDW. record descriptor word.
read access read access. Permission to read information.
reader reader. A program that reads jobs from an input device or data base file and plac
real address real address. In virtual storage systems, the address of a location in central stor
Real Application Testing [Abbreviation used by Oracle]
real storage real storage. Synonymous with central storage.
reason code reason code. A return code that describes the reason for the failure or partial su
receive receive. In SMP/E, to read SYSMODs and other data from SMPPTFIN and SMP
RECEIVE command RECEIVE command. The SMP/E command used to read in SYSMODs and othe
RECEIVE processing RECEIVE processing. An SMP/E process necessary to install new product librari
RECFM RECFM. record format.
reconfiguration coordination manager (reconfiguration coordination manager) A framework that manages the d
reconfiguration coordination manager
record record. (1) A group of related data, words, or fields treated as a unit, such as one
Record and Playback framework
record data record data. Data sets with a record-oriented structure that are accessed record
recording format recording format. For a tape volume, the format of the data on the tape, for exa
recoverability recoverability. The extent to which the system can be restored to an operationa
recovery recovery. The process of rebuilding data after it has been damaged or destroyed
Recovery Manager RMAN: Recovery Manager
recovery point objective RPO: recovery point objective
recovery point objective
recovery system recovery system. A system that is used in place of a primary application system
recovery time objective RTO: recovery time objective
recovery time objective
recursive routine recursive routine. A routine that can call itself or be called by another routine th
redundancy redundancy. The use of several identical functional units, such as several disk d
redundant array of independent disk redundant array of independent disk (RAID). A disk subsystem architecture 
Redundant Array of Inexpensive Disks RAID: Redundant Array of Inexpensive Disks
reenterable reenterable. The reusability attribute that allows a program to be used concurre
reentrant reentrant. The attribute of a routine or application that allows more than one use
Reflexive User Interface Builder
refreshable refreshable. The reusability attribute that allows a program to be replaced (refre
register register. An internal computer component capable of storing a specified amount 
register save area register save area (RSA). Area of main storage in which contents of registers ar
related installation materials related installation materials (RIMs). In IBM custom-built offerings, task-orien
Relational Database Management System RDBMS: Relational Database Management System
relative distinguished name RDN: relative distinguished name
release release. A distribution of a new product or new function and APAR fixes for an ex
reliability reliability. A measurement of the ability of a system to continue processing witho
remote copy remote copy. A storage-based disaster recovery and workload migration functio
remote job entry remote job entry (RJE). Submission of job control statements and data from a r
Remote Method Invocation
remote operations remote operations. Operation of remote sites from a host system.
Request for Change
request for change
request for comment request for comment (RFC). In Internet communications, a document that desc
Request for comments
Request for Proposal
request header request header (RH). The control information that precedes a request unit (RU)
request unit request unit (RU). A message unit that contains control information, end-user d
Requirements traceability matrix
Requirements traceability matrix
reserved storage allocation reserved storage allocation. The amount of central and expanded storage that
residency mode residency mode (RMODE). The attribute of a program module that specifies wh
resolver resolver. In TCP/IP, a program or subroutine that obtains information from a dom
Resource Access Control Facility Resource Access Control Facility (RACF). An IBM security manager product th
Resource Management Facility Resource Management Facility (RMF). IBM software product that measures a
resource manager RM: resource manager
resource recovery services resource recovery services (RRS). The z/OS system component that provides 
response unit response unit (RU). A message unit that acknowledges a request unit. It may co
responsible, accountable, consulted and informed
restore restore. In SMP/E, to remove applied SYSMODs from the target libraries by use
RESTORE command RESTORE command. The SMP/E command used to remove applied SYSMODs
restructured extended executor restructured extended executor (REXX). A general-purpose, procedural langu
resynchronization resynchronization. A track image copy from the primary volume to the seconda
return code return code. A code produced by a routine to indicate its success or failure. It m
return on assets
return on investment
Return on Investment
reusability reusability. The attribute of a module or section that indicates the extent to which
Reverse Address Resolution Protocol (Reverse Address Resolution Protocol) A protocol that maps dynamically
Reverse Address Resolution Protocol
reverse explicit route reverse explicit route. Explicit routes that terminate in the host and must use th
Reverse Semantic Traceability
Revocation list Certificate Revocation List. A list of certificates in a Public Key Infrastructu
RFC RFC. request for comment.
RH RH. request/response header.
RIM RIM. related installation material.
RIP RIP. Routing Information Protocol.
RJE RJE. remote job entry.
RMF RMF. Resource Measurement Facility.
RMODE RMODE. residency mode.
rollback rollback. The process of restoring data changed by an application to the state at
root cause analysis
Root cause analysis
route selection services route selection services (RSS). A subcomponent of the topology and routing se
router router. A computer that determines the path of network traffic flow. The path sele
routine routine. (1) A program or sequence of instructions called by a program. Typically
routing routing. The assignment of the communications path by which a message is to r
routing code routing code. A code assigned to an operator message and used to route the m
Routing Information Protocol (Routing Information Protocol) An Internal Gateway Protocol that routes
Routing Information Protocol
Routing Information Protocol Routing Information Protocol (RIP). In the Internet suite of protocols, a protoc
Routing Information Protocol next generation (Routing Information Protocol next generation) An Internal Gateway Prot
Routing Information Protocol next generation
routing protocol routing protocol. A technique used by a router to find other routers and to rema
routing table routing table. A collection of routes used to direct datagram forwarding or to est
row logical change record row LCR: row logical change record
RRI RRI. request/response indicator.
RSA RSA. register save area.
RSN RSN. resource sequence number.
RST RST. reset the connection.
RTP RTP. rapid transport protocol.
RTT RTT. round trip time.
RU RU. request/response unit.
run run. To cause a program, utility, or other machine function to be performed.
runtime runtime. Any instant at which a program is being executed. Synonymous with ex
runtime The library containing Language Environment® runtime routines.
runtime environment runtime environment. A set of resources that are used to support the executio
SAF SAF. system authorization facility.
SAP SAP. (1) System Assistance Processor. (2) service access point.
Sarbanes–Oxley
SATF SATF. shared access transport facility.
save area save area. Area of main storage in which contents of registers are saved.
scalability scalability. The ability of a system to expand as resources, such as processors, 
scan attack scan attack. An attack in which a host on the network is trying to determine wha
SDLC SDLC. synchronous data link control.
SDSF SDSF. System Display and Search Facility.
SDUMP macro SDUMP macro. A z/OS macro that can be invoked by authorized programs to ta
SE SE. Support Element.
Secure Hash Algorithm SHA: Secure Hash Algorithm
Secure Hashing Algorithm
Secure Remote Procedure Call (Secure Remote Procedure Call) A method that protects remote procedu
Secure Remote Procedure Call
Secure Shell SSH: Secure Shell
Secure Shell
Secure Sockets Layer SSL: Secure Sockets Layer
secure sockets layer
Secure Sockets Layer Secure Sockets Layer (SSL). A security protocol that provides communication pr
security administrator security administrator. A programmer who manages, protects, and controls acc
security association (security association) An association that specifies security properties fro
security association
security associations database (security associations database) A table of SAs that specifies cryptograph
security associations database
Security Checklist
Security Management Information System
security parameter index
security policy database
sendmail sendmail. The mail server that uses the Simple Mail Transfer Protocol (SMTP) to
sense code sense code. A diagnostic code that helps in problem determination.
separation of concerns
sequential data set sequential data set. (1) A data set whose records are organized on the basis of
serially reusable serially reusable. The reusability attribute that allows a program to be executed
server server. (1) In a network, hardware or software that provides facilities to clients. E
server address space server address space. Any address space that does work on behalf of a tr
Server Control SRVCTL: Server Control
Server Message Block
Server-Side Include SSI: Server-Side Include
service service. PTFs and APAR fixes.
service acceptance criteria
service access point service access point (SAP). (1) In Open Systems Interconnection (OSI) architec
service asset and configuration management
service capacity management
service design package
Service design package
service failure analysis
service improvement plan
service knowledge management system
Service Knowledge Management System
service level service level. The FMID, RMID, and UMID values for an element. The service le
service level agreement SLA: service level agreement
service level agreement
service level agreement service level agreement (SLA). A written agreement of the information systems
service level management
service level package
service level requirement
service maintenance objective
service management facility
service object pair SOP: service object pair
service portolio management
service processor service processor. The part of a processor complex that provides for the mainte
service provider service provider. (1) In the OSI reference model, a layer that provides services 
service provider interface
service provisioning optimization
service request block service request block (SRB). In z/OS, a dispatchable unit. See dispatch .
service unit service unit. The amount of service consumed by a work request as calculated 
Service-oriented architecture
session session. (1) The period of time during which a user of a terminal can communica
session activation request session activation request. In SNA, a request that activates a session between
session data unit SDU: session data unit
session services Session services for its local LUs and client end nodes.
severity code severity code. A part of operator messages that indicates the severity of the erro
sfp sfp. secure FTP.
shared DASD option shared DASD option. An option that enables independently operating computin
shared storage shared storage. An area of storage that is the same for each virtual address spa
Sharepoint
SharePoint Central Administration
SharePoint Deployment Planning Services
Sharepoint Deployment Planning Services
SharePoint Foundation
SharePoint Integration Framework
SharePoint Learning Kit
SharePoint Object Model
SharePoint Portal Server
Sharepoint Portal Server
SharePoint Portal Server Frequently Asked Questions
Sharepoint Server
SharePoint Site Migration Manager
SharePoint Sofware Factory
Sharepoint Solution Deployer
SharePoint Team Services
shell shell. A program that interprets sequences of text input as commands. It may ope
side side. One of the configurations formed by physical partitioning.
SIGA SIGA. signal adapter.
SIGP SIGP. signal processor.
Simple API for XML SAX: Simple API for XML
Simple Network Management Protocol
Simple Object Access Protocol SOAP: Simple Object Access Protocol
simultaneous peripheral operations online simultaneous peripheral operations online (spool).  The reading and writing
single point of control single point of control. The characteristic a sysplex displays when you can acc
single point of failure
single root I/O virtualization
single sign-on SSO: single sign-on
single system image single system image. The characteristic a product displays when multiple image
single-image single-image (SI) mode. A mode of operation for a multiprocessor (MP) system
single-processor complex single-processor complex. A processing environment in which only one proces
single-system sysplex single-system sysplex. A sysplex in which only one z/OS system is allowed to b
SLA SLA. service level agreement.
SLU SLU. s econdary logical unit.
Small Computer System Interface SCSI: Small Computer System Interface
small computer system interface small computer system interface (SCSI). A standard hardware interface that e
SMF SMF. system management facilities.
SMP/E SMP/E. System Modification Program/Extended.
SMPCSI SMPCSI. The SMP/E data set that contains information about the structure of a u
SMS SMS. Storage Management Subsystem.
SMTP SMTP. Simple Mail Transfer Protocol.
SNA SNA. Systems Network Architecture.
SNA network interconnection SNA network interconnection (SNI). The connection, by gateways, of two or m
SNASw SNASw. SNA Switching Services.
SNI SNI. SNA network interconnection.
SNMP SNMP. Simple Network Management Protocol.
socket socket. A unique host identifier created by the concatenation of a port identifier w
sofware sofware. (1) All or part of the programs, procedures, rules, and associated docu
Sofware as a Service
sofware asset management
Sofware Change Request
Sofware Development Kit
Sofware development life cycle
Sofware development plan
Sofware Engineering Institute
Sofware engineers in test
Sofware life cycle
Sofware Maintenance and Regression Test System
Sofware quality system
Sofware quality system plan
Sofware requirements review
Sofware testing automation framework
Sofware testing lifecycle
Sofware trouble report
sort/merge program sort/merge program. A processing program that can be used to sort or merge r
source code source code. The input to a compiler or assembler, written in a source language
Source Code Analyzer
source program source program. A set of instructions written in a programming language that m
Spanning Tree Protocol
specific, measurable, achievable, relevant and time-bound
spin data set spin data set. A data set that is deallocated (available for printing) when it is clos
spoofing spoofing. For data links, a technique in which a protocol initiated from an end sta
spool spool. simultaneous peripheral operations online.
spooled data set spooled data set. A data set written on an auxiliary storage device and manage
spooling spooling. The reading and writing of input and output streams on auxiliary storag
SPUFI SPUFI. SQL Processing Using File Input.
SQA SQA. system queue area.
SQL SQL. Structured Query Language.
SQL Tuning Set STS: SQL Tuning Set
SREL SREL. system release identifier.
SRM SRM. system resources manager.
SSCH SSCH. start subchannel.
SSCP SSCP. system services control point.
SSCP-dependent LU SSCP-dependent LU. An LU that requires assistance from a system services co
SSCP-independent LU SSCP-independent LU. An LU that is able to activate an LU-LU session (that is,
SSCP-LU session SSCP-LU session. In SNA, a session between a system services control point (S
SSCP-SSCP session SSCP-SSCP session. In SNA, a session between the system services control poin
ssh SSH. S ecure Shell.
SSID SSID. subsystem identifier.
SSL SSL. Secure Socket Layer.
stand-alone dump stand-alone dump. A kind of dump produced by an operator using a stand-alon
Standard
standard
standard operating procedures
Standards committee
Standards group
star topology star topology. In network architecture, a network topology in which every node o
start option start option. In VTAM, a user-specified or IBM-supplied option that determines c
started task started task. In z/OS, an address space that runs unattended as the result of a S
statement of requirements
state-oriented protocol state-oriented protocol. A characteristic of the OSPF protocol, in which interfa
Static Code Analysis
static routing static routing. A method of setting paths between hosts, networks, or both, by m
status-display console status-display console. An MCS console that can receive displays of system st
step restart step restart. A restart that begins at the beginning of a job step. The restart may
STI STI. self-timed interface.
storage administrator storage administrator. A person in the data processing center who is responsib
Storage Area Network SAN: Storage Area Network
storage class storage class. A collection of storage attributes that identify performance goals a
storage group storage group. A collection of storage volumes and attributes, defined the storag
storage management storage management. The activities of data set allocation, placement, monitori
storage management subsystem storage management subsystem (SMS). A facility used to automate and centr
Stream Control Transport Protocol (Stream Control Transport Protocol) A transport layer protocol that provi
Stream Control Transport Protocol
string string. A collection of one or more I/O devices. The term usually refers to a physi
structure structure. A construct used by z/OS to map and manage storage on a Coupling 
Structured Analysis
Structured Generalized Markup Language SGML: Structured Generalized Markup Language
Structured Query Language SQL: Structured Query Language
Structured Testing and Requirements Tool
stub area stub area. In the OSPF protocol, a routing area for which packets can flow into a
subarea subarea. A portion of the SNA network consisting of a subarea node, attached pe
subarea network subarea network. Interconnected subareas, their directly attached peripheral no
subchannel set subchannel set. Installation-specified structure that defines the placement of de
subnet subnet. Synonym for subnetwork.
subnetwork subnetwork. (1) Any group of nodes that have a set of common characteristics, 
subpool storage subpool storage. All of the storage blocks allocated under a subpool number for
subsystem subsystem. A secondary or subordinate system, or programming support, usuall
subsystem interface subsystem interface (SSI). A component that provides communication between
subtask subtask. In the context of z/OS multitasking, a task that is initiated and terminate
superuser superuser. (1) A system user who operates without restrictions. A superuser has
superuser authority superuser authority. The unrestricted ability to access and modify any part of th
supervisor supervisor. The part of z/OS that coordinates the use of resources and maintain
supervisor call supervisor call (SVC). An instruction that interrupts a program being executed a
supplier and contract management information system
support element support element (SE). (1) An internal control element of a processor that assist
suspended state suspended state. When only one of the devices in a dual copy or remote copy v
SVC SVC. supervisor call.
SVC dump SVC dump. A dump generated by a supervisor call (SVC).
SVC interruption SVC interruption. An interruption caused by the execution of a supervisor call in
SVC routine SVC routine. A control program routine that performs or begins a control program
SWA SWA. scheduler work area.
swap data set swap data set. A data set dedicated to the swapping operation.
swapping swapping. A z/OS paging operation that writes the active pages of a job to auxili
switch switch. A device that provides connectivity capability and control for attaching an
switched multimegabit data service switched multimegabit data service (SMDS). A high-speed technology offere
SYN SYN. synchronize sequence numbers.
SYN flood SYN flood. A type of denial of service attack in which a series of SYN packets ar
Synchronous Data Link Control Synchronous Data Link Control (SDLC). A protocol for managing synchronous
synchronous messages synchronous messages. WTO or WTOR messages issued by a z/OS system d
syncpoint manager syncpoint manager. A function that coordinates the two-phase commit process 
syntax syntax. The rules governing the structure of a programming language and the co
SYSIN SYSIN. A system input stream; also, the name used as the data definition name o
SYSLIB SYSLIB. (1) A subentry used to identify the target library in which an element is ins
SYSLOG SYSLOG. system log.
SYSMOD SYSMOD. system modification.
SYSOUT SYSOUT. A system output stream; also, an indicator used in data definition statem
SYSOUT class SYSOUT class. A category of output with specific characteristics and written on a
sysplex sysplex. A set of z/OS systems communicating and cooperating with each other 
sysplex couple data set sysplex couple data set. A couple data set that contains sysplex-wide data abo
sysplex distributor sysplex distributor. A software function in z/OS that increases availability throug
Sysplex Timer Sysplex Timer. A hardware device that synchronizes the time-of-day (TOD) clock
SYSRES SYSRES. system residence disk.
system system. The combination of a configuration (hardware) and the operating system
system abend system abend. An abend caused by the operating system's inability to process a
System and sofware design document
system authorization facility system authorization facility (SAF). An interface defined by z/OS that enables
system board system board. In a personal computer (PC), the main circuit board that supports
system change number SCN: system change number
system console system console. In z/OS, a console attached to the processor controller used to
system control element system control element (SCE). Hardware that handles the transfer of data and
system data system data. The data sets required by z/OS or its subsystems for initialization.
System Display and Search Facility System Display and Search Facility (SDSF).  A panel-based product that provid
System Global Area SGA: System Global Area
System Investigation Report
system library system library. A collection of data sets or files in which the parts of an operating
system management facilities system management facilities (SMF). A z/OS component that provides the me
system modification system modification (SYSMOD). In SMP/E, the input data that defines the intro
System Modification Program Extended System Modification Program Extended (SMP/E). An IBM program product, 
system operator system operator. A person responsible for performing system-oriented procedur
system programmer system programmer. A person who plans, generates, maintains, extends, and c
system queue area system queue area (SQA). In z/OS, an area of virtual storage reserved for syste
system services control point system services control point (SSCP). A focal point in an SNA network for man
System trouble report
System Under Test
Systematic Test and Evaluation Process
system-managed data set system-managed data set. A data set that has been assigned a storage class.
system-managed storage system-managed storage. Storage managed by the storage management subs
Systems Analysis and Design Technique
Systems Network Architecture Systems Network Architecture (SNA). The description of the logical structure,
T2.0 T2.0. type 2.0 node.
T2.1 T2.1. type 2.1 node.
T4 T4. type 4 node.
T5 T5. type 5 node.
tablespace point-in-time recovery TSPITR: tablespace point-in-time recovery
tailgate tailgate. The lower portion of the hardware frame. The tailgate allows access to t
tape tape. A thin, flexible magnetic strip on which data can be stored.
tape volume tape volume. Storage space on tape, identified by a volume label, which contain
target library target library. In SMP/E, a collection of data sets in which the various parts of an
Target of Evaluation
target zone target zone. In SMP/E, a collection of VSAM records describing the target syste
task task. In a multiprogramming or multiprocessing environment, one or more seque
task control block task control block (TCB). A data structure that contains information and pointers
TB TB. terabyte.
TCB TCB. task control block.
TCO TCO. total cost of ownership.
TCP TCP. Transmission Control Protocol.
TCP/IP TCP/IP. Transmission Control Protocol/Internet Protocol.
TDM TDM. topology database manager.
TDU TDU. topology data update.
technical observation
telecommunication line telecommunication line. (1) The portion of a data circuit external to a data circ
Telnet Telnet. In the Internet suite of protocols, a protocol that provides remote terminal
temporary data set temporary data set. A data set that is created and deleted in the same job.
terabyte terabyte. For processor storage, real and virtual storage, and channel volume, 2
terminal terminal. In data communication, a device, usually equipped with a keyboard an
terminal owning region terminal owning region (TOR). A CICS region devoted to managing the termin
terms of reference
Test Automation Program
Test case design yield
Test Coverage Analysis Tool
Test engineering managers
Test filelData Generator
Test Maturity Model
Test point analysis
Test Process Improvement
Test readiness review
Test traceability matrix
Test-driven development
Testing and Test Control Notation
Testing as a Service.
TG TG. transmission group.
TGTLIB TGTLIB. target library.
TGV TGV. transmission group vector.
TH TH. transmission header.
The act of verifying the identity that is supplied over the network by a remote user or entity, such as a program.
The data that is carried in a packet. The payload does not include the header information that is required to get the packet to i
The data that uniquely identifies an Internet packet. The header includes source and destination addresses for the packet. An o
The entity that communicates with the EVS controller to define the L2 network topologies and the IP addresses that must be u
The EVS component that maintains the configuration and status of elastic virtual switches across multiple nodes.
The location on the disk or card where cryptographic keys are stored.
The MAC client that represents the NIC or PV NIC and has its own address and other attributes of L2
The management of cryptographic keys. This management includes the generation, exchange, storage, use, and replacement o
The mechanism for encapsulating IP packets within IP packets. See encapsulation.
the Microsof CryptoAPI or Cryptographic Application the Microsof CryptoAPI or Cryptographic Application Progamming Interf
The minimum share of the bandwidth that the VNIC will get when there is competition from other VNICs on the same datalink
The name that the administrator gives to the keystore. In the Cryptographic Framework, the keystore name is also called the 'to
The peer that initiates the call to establish a dial-up PPP link. Afer it is configured, the dial-out machine can call any number of
The peer that negotiates and establishes the recipient end of a dial-up PPP link afer receiving a call from a dial-out machine. T
The priority with which packets belonging to a flow are processed. If the priority property of a flow is set to high, all the packet
The process by which a host automatically configures its IPv6 address from the site prefix and the local MAC address.
The process of detecting when a NIC or the path from the NIC to a Layer 3 device starts operating correctly afer a failure.
The process of detecting when an interface or the path from an interface to an Internet layer device no longer works. IP netwo
The process of distributing inbound or outbound traffic over a set of interfaces. With load spreading, higher throughput is achi
The process of hosts locating routers that reside on an attached link.
The process of hosts requesting routers to generate router advertisements immediately, rather than at their next scheduled tim
The process of routers advertising their presence together with various link and Internet parameters, either periodically or in re
The system's only fixed NCP in which the network configuration is instantiated but not monitored.
The Transport Layer Security
third generation language third generation language (3GL). A high-level programming language that was
third normal form 3NF: third normal form
Thousands of lines of code
throughput throughput. A measure of the amount of information transmitted over a network
tightly coupled tightly coupled. Multiple CPs that share storage and are controlled by a single c
tightly coupled multiprocessing tightly coupled multiprocessing. Two computing systems operating simultane
tightly coupled multiprocessor tightly coupled multiprocessor. Any CPU with multiple CPs.
Time Partition Testing
Time Sharing Option/Extensions Time Sharing Option/Extensions (TSO/E). The facility in z/OS that allows use
time-out time-out. The time in seconds that the storage control remains in a "long busy" c
TLIB TLIB. target library.
TLS TLS. Transport Layer Security.
TN3270 TN3270. Telnet/3270.
TN3270E TN3270E. Telnet/3270 Enhanced.
token ring network token ring network. (1) According to IEEE 802.5, network technology that contr
topology database topology database. See local topology database, network topology database.
topology database update topology database update (TDU). A message about a new or changed link or 
ToS ToS. type of service.
total cost of ownership
total cost of ownership total cost of ownership (TCO). A methodology for calculating the actual cost of
total cost of utilization
Total quality control
total quality management
TP TP. transmission priority.
TP UML Testing Profile
track track. A circular path on the surface of a disk or diskette on which information is m
transaction transaction. A unit of work performed by one or more transaction programs, invo
transaction identifiers XIDs: transaction identifiers
transistor transistor. A small solid-state device used in semiconductors to amplify an electr
transit area transit area. In the OSPF protocol, a routing area that can have traffic passing th
Transmission Control Protocol Transmission Control Protocol (TCP). A communications protocol used in the I
Transmission Control Protocol/Internet Protocol Transmission Control Protocol/Internet Protocol (TCP/IP). A hardware indep
transmission group transmission group (TG). (1) A connection between adjacent nodes that is iden
transmission header transmission header (TH). Control information, optionally followed by a basic in
transmission line transmission line. Synonymous with telecommunication line .
transmission priority transmission priority. A rank assigned to a message unit that determines its pre
Transparent Application Failover TAF: Transparent Application Failover
transparent interconnection of lots of links
Transparent Network Substrate TNS: Transparent Network Substrate
transport layer transport layer. A network service that provides end-to-end communications bet
Transport Layer Security Transport Layer Security (TLS). A protocol standard that uses encryption to pro
transport protocol transport protocol. A specification of the rules governing the exchange of inform
Tree and Tabular Combined Notation version 1
Triple-Data Encryption Standard (Triple-Data Encryption Standard) A symmetric-key encryption method th
Triple-Data Encryption Standard
Trivial File Transfer Protocol
TRK TRK. A subparameter of the SPACE parameter in a DD statement. It specifies tha
TRL TRL. transport resource list.
TRLE TRLE. transport resource list element.
trunk trunk. In telephony, circuits that connect two switching systems, as opposed to c
trunk cable trunk cable. Cables used to make permanent connections between cabinets an
Trusted Computing Base
TSO TSO. Time-sharing option. See Time Sharing Option/ Extensions (TSO/E).
TSO/E TSO/E. Time Sharing Option/Extensions.
TSR TSR. target service responsiveness.
twisted pair twisted pair. A transmission medium that consists of two insulated electrical con
Two-Task Common TTC: Two-Task Common
UCB UCB. unit control block.
UCLIN UCLIN. In SMP/E, the command used to initiate changes to SMP/E data sets. Ac
UDP UDP. User Datagram Protocol.
UID UID. user identifier.
UIM UIM. unit information module.
underpinning contract
Unicode Unicode. (1) A universal character encoding standard that supports the interchan
Unified Modelling Language
Uniform Resource Identifier URI: Uniform Resource Identifier
Uniform Resource Identifier
uniform resource indicator
Uniform Resource Locator URL: Uniform Resource Locator
Uniform Resource Locator
uniprocessor uniprocessor (UP). A processor complex that has one central processor.
unique identifier UID: unique identifier
unit development folder
unit of recovery unit of recovery (UR). A set of changes on one node that is committed or backe
Universal Description, Discovery and Integration UDDI: Universal Description, Discovery and Integration
Universal Description, Discovery and Integration
Universal Naming Convention UNC: Universal Naming Convention
UNIX file system UNIX file system. A section of the UNIX file tree that is physically contained on a
UNIX operating system UNIX operating system. An operating system, developed by Bell Laboratories, 
UNIX-to-UNIX Copy Program
unload unload. In SMP/E, to copy data out of SMP/E data set entries in the form of UCL
UNLOAD command UNLOAD command. The SMP/E command used to copy data out of SMP/E da
unused cable unused cable. Physical cables that have been recently disconnected, but not ye
upper control limit
upwardly compatible upwardly compatible. The ability for applications to continue to run on later rele
URG URG. urgent flag.
Usability-Test Candidate
Use Dynamic Management Views Dynamic Management Views, a feature of SQL Server. See Use Dynamic
Used to implement an elastic virtual switch. All VM instances can be placed on the same segment without a VLAN or VXLAN. T
user abend user abend. A request made by user code to the operating system to abnormally
user catalog user catalog. An optional catalog used in the same way as the master catalog a
User Datagram Protocol
User Datagram Protocol User Datagram Protocol (UDP). In the Internet suite of protocols, a protocol th
user exit user exit. A routine that takes control at a specific point in an application. User ex
user ID user ID. user identification.
user identification user identification (user ID). A 1-8 character symbol identifying a system user.
User Interface XML UIX: User Interface XML
user modification user modification (USERMOD). In SMP/E, a change constructed by a user to m
user profile
User-based Security Model
USERMOD USERMOD. user modification.
Using Common Table Expressions Common Table Expression. In SQL Server Transact-SQL, a temporary nam
Using the Client Object Model Client Side Object Model. Provides client applications access to a subset
UTP UTP. unshielded twisted pair.
V=R region V=R region. Synonymous with nonpageable region.
V=V region V=V region. Synonymous with pageable region.
value on investment
variable-length record variable-length record. A record having a length independent of the length of o
VB VB. Variable blocked.
vendor vendor. A person or company that provides a service or product to another perso
Verification and validation
version version. A separate licensed program that is based on an existing licensed progr
VIO VIO. virtual input/output.
VIPA VIPA. virtual IP address.
virtual address space virtual address space. In virtual storage systems, the virtual storage assigned t
Virtual environment
virtual extensible local area network
virtual function
virtual input/output virtual input/output (VIO). The allocation of data sets that exist in paging stora
Virtual IP address
virtual IP address virtual IP address (VIPA). An IP address that is not associated with any physica
virtual LAN device
virtual local area network
Virtual network computing
virtual network identifier
virtual network interface card
virtual private network
virtual private network virtual private network (VPN). A general term to describe a secure tunnel (dat
virtual route virtual route (VR). (1) In SNA, either (a) a logical connection between two suba
Virtual Router ID
Virtual Router Redundancy Protocol
virtual station instance
virtual storage virtual storage. (1) The storage space that can be regarded as addressable ma
virtual storage access method virtual storage access method (VSAM). An access method for direct or seque
virtual telecommunications access method virtual telecommunications access method (VTAM). A set of programs that 
VIT VIT. VTAM internal trace.
vital business function
VLAN VLAN. virtual LAN.
VM VM. Virtual Machine.
VOLSER VOLSER. volume serial number.
volume volume. (1) The storage space on DASD, tape or optical devices, which is identi
volume backup volume backup. Backup of an entire volume to protect against the loss of the vo
volume serial number volume serial number. A number in a volume label that is assigned when a vol
Volume Shadow Copy Service VSS: Volume Shadow Copy Service
volume table of contents volume table of contents (VTOC). A table on a direct access storage device (D
VPN VPN. virtual private network.
VR VR. virtual route.
VRN VRN. virtual routing node.
VSAM VSAM. virtual storage access method.
VSI Discovery and Configuration Protocol
VTAM VTAM. Virtual Telecommunications Access Method.
VTOC VTOC. volume table of contents.
VXLAN segment ID
wait state wait state. Synonymous with waiting time.
waiting time waiting time. (1) The condition of a task that depends on one or more events in
WAN WAN. wide area network.
WAP WAP. wireless access point.
WCC WCC. write control character.
Web Services Description Language WSDL: Web Services Description Language
WebSphere Application Server WebSphere Application Server. Web application server software that runs on a
WebSphere MQ WebSphere MQ. A family of IBM licensed programs that provides message que
WebSphere® WebSphere®. An IBM brand name that encompasses tools for developing e-bus
well-known port well-known port. In Internet communications, one of a set of preassigned proto
What is DISM? Deployment Image Servicing and Management. A command line tool or
What is the Azure Database Migration Service? Database Migration Service. See What is the Azure Database Migration S
wide area network wide area network (WAN). A network that provides communication services be
Wi-Fi Wi-Fi. wireless fidelity.
wild carding wild carding. The use of an asterisk (*) as a multiple character replacement in c
Windows Automated Installation Kit Windows Automated Installation Kit. See Windows Automated Installatio
Windows Azure Active Directory Authentication LibrarWindows Azure Active Directory Authentication Library. See Azure AD Au
Windows Azure Active Directory Rights Management Windows Azure Active Directory Rights Management. See Azure Rights M
wired equivalent privacy key
Wireless Application Protocol
WLM WLM. workload management.
work in progress
work request work request. A piece of work, such as a request for service, a batch job, an AP
Working Group WG: Working Group
workload workload. A group of work to be tracked, managed and reported as a unit.
workload management workload management (WLM). A z/OS component that prioritizes workloads 
World Wide Web Consortium W3C: World Wide Web Consortium
World Wide Web Distributed Authoring and Versionin WebDAV: World Wide Web Distributed Authoring and Versioning
wrap mode wrap mode. The console display mode that allows a separator line between old
write-to-operator write-to-operator (WTO) message. A message sent to an operator console in
write-to-operator-with-reply write-to-operator-with-reply (WTOR) message. A message sent to an opera
WSF WSF. write structured field.
WTO WTO. write-to-operator.
WTOR WTOR. write-to-operator-with-reply.
xa XA . Extended Architecture.
XCA XCA. external communication adapter.
XCF XCF. cross-system coupling facility.
XID XID. exchange ID.
XML Query XQuery: XML Query
XML SQL Utility XSU: XML SQL Utility
XSLT Virtual Machine XVM: XSLT Virtual Machine
z/Architecture z/Architecture. An IBM architecture for mainframe computers and peripherals. T
z/OS z/OS. A widely used operating system for IBM mainframe computers that uses 64
z/OS Language Environment z/OS Language Environment. An IBM software product that provides a commo
z/OS UNIX System Services z/OS UNIX System Services (z/OS UNIX). z/OS services that support a UNIX-l
zAAP zAAP. zSeries Application Assist Processor.
zFS zFS. zSeries file system.
zSeries zSeries. IBM enterprise servers based on z/Architecture.
zSeries Application Assist Processor zSeries Application Assist Processor (zAAP). A specialized processing assist 
zSeries File System zSeries File System (zFS). A z/OS UNIX file system that stores files in VSAM line
A block of IPv4 or IPv6 addresses that are associated with an elastic virtu
A cryptographic algorithm, which requires two different keys that are ma
A designation that is used for addressing on a single link for purposes suc
A digital code that is attached to an electronically transmitted message t
A feature in EVB that provides an option to send inter-VM traffic on the w
A firewall function that can be configured to allow or disallow specified p
A form of PPP over asynchronous serial lines, which transfer data one ch
A group of information that is transmitted as a unit over communication
A group of interfaces with the same anycast IPv6 address. The Oracle Sol
A host whose VNICs connect to an elastic virtual switch.
A I/O technology that is based on switched fabrics. It provides high band
A measure that is used to identify the number of routers that separate tw
A method for obtaining digital signatures and public key cryptosystems.
A method of combining several links on a system into a single logical unit
A method that enables you to record resource consumption statistics on
A method that is used to capture statistics about network traffic in a log
A module in the diffserv architecture that marks a packet with a value th
A module in the diffserv architecture that measures the rate of traffic flo
A network attack in which a packet is captured by an intruder during data
A network configuration mode in which the instantiated configuration on
A network configuration mode in which the system automatically adapts
A network host is any device or a computer connected to a computer ne
A network layer procedure that is used to send datagram packets to mul
A packet that is sent to a system on the Internet to solicit a response. Suc
A port configured on the top-level switch uplink port that can communic
A port that is configured on the intermediate switches to allow PVLAN tr
A PPP connection that involves a host and a CSU/DSU that are connected
A PPP connection that involves a peer and a modem at either end of a te
A process of accumulating and recording information about traffic flows
A response to a neighbor solicitation message or the process of a node s
A scripting format that is used in PPP and UUCP chat scripts. The chat scr
A set of rules that define the characteristics of a class in the IPQoS config
A single routing domain that is used for administering the network topol
A solicitation that is sent by a node to determine the link-layer address o
A sub-VLAN of a primary VLAN.
A symmetric block cipher algorithm that takes a variable-length key from
A system that has more than one interface and that does not perform pa
A system that has more than one interface, runs routing protocols, and fo
A system that is used for connecting a number of computer systems to fo
A system's attachment to a link. This attachment is ofen implemented as
A table that contains the routing information for a packet, which helps to
A TCP/IP protocol stack that enables both IPv4 and IPv6 protocols to ope
A tunnel that can transmit packets in both directions.
A type of routing in which the system automatically updates the routing
A type of secondary VLAN. The ports associated with community VLANs
A type of secondary VLAN. The ports that are associated with this type o
A type of VNIC that enables the transport of the IP packets over IB conne
A unicast address that has only a local routeability scope (within the sub
A virtual Ethernet switch that is configured at the datalink layer (L2) of th
A virtual network that is isolated both from other virtual networks that a
A VNIC or an IPoIB partition datalink that is configured by using the zone
A VRRP instance for a VRID that is active but not in the master state is ca
A VRRP instance that performs the routing function for the virtual router
An ASCII or binary string that is used for identification purposes and is kn
An asymmetric cryptographic key agreement protocol that enables two u
An attack where incoming network packets intentionally or inadvertently
An automatic tunneling mechanism that transfers IPv6 packets over an IP
An encryption system in which the sender and receiver of a message use
An entity that resides in the hypervisor of the guest operating system an
An Ethernet procedure in which two connected devices share their capa
An EVS component from which you manage elastic virtual switches.
An extension header that provides authentication and integrity without c
An intermediary server between a client and another server. It provides c
An Internet Engineering Task Force architectural standard for implementi
An IP address that can be used as the source or destination address for d
An IP address that cannot be used as the source address for data in an IP
An IP address that is not routeable through the Internet. Private address
An IP mechanism that enables hosts to locate other hosts that reside on
An IP multipathing group consists of a set of network interfaces with a se
An IPv4 network address with the host portion of the address containing
An IPv4 or IPv6 address that identifies a group of interfaces. A packet tha
An IPv6 address that is assigned to a group of interfaces, usually belongin
An optional form of IPv4 in IPv4 tunneling that can be supported by hom
Advanced Clustering, a component of ORME, also known as CIS.
In eXchange an Attributes Definition defines the metadata attributes of p
Applicability Statement 2 (AS2) is an Internet Draf security standard defi
Oracle Retail Assortment and Space Optimization.
Business-to-business (B2B) interactions are those that occur between bu
In eXchange, Business Attribute Definitions (BADs) define the metadata a
Business Intelligence.
In eXchange, Business Protocol Attribute Definitions (BPADs) define meta
The Sun Java Composite Application Platorm Suite (Java CAPS) includes
Customer Decision Tree, a component of ORME.
The Chemical Industry Data Exchange (CIDX) is a non-profit organization
Oracle Retail Category Management.
Database.
In eXchange, Delivery Protocol Attribute Definitions (DPADs) define meta
Demand Transference, a component of ORME.
In eXchange, Enveloping Attribute Definitions (EADs) define the metadat
A well-recognized e-business XML (extensible markup language; see “XM
eXchange Partner Manager (ePM) is a Web-based GUI for defining and m
File Transport Protocol (FTP) is a transport protocol for sending and recei
Hypertext Transport Protocol (HTTP) is a transport protocol for transmitti
Before Java CAPS 5.1.x, SeeBeyond offered an Integrated Composite App
The Lightweight Directory Access Protocol is a standard networking proto
In eXchange, Messaging Attribute Definitions (MADs) define the metada
Market Basket Analysis.
Oracle MetaData Services.
Multipurpose Internet Mail Extensions (MIME) extends the format of bas
Oracle Retail Advanced Science Engine, also known as RSE. It contains CD
In Java CAPS, an Object Type Definition (OTD) contains the data structure
In eXchange, Packaging Attribute Definitions (PADs) define the metadata
Retail Analytics.
Retail Analytics Data Model, also known as RA Schema.
Oracle Retail Demand Forecasting.
The purpose of the RosettaNet Implementation Framework (RNIF) is to a
Secure/Multipurpose Internet Mail Extensions (S/MIME) provides a cons
In Java CAPS, Secure Messaging Exchange (SME) uses advanced cryptogr
Simple Mail Transfer Protocol (SMTP) is a transport protocol for transmitti
In eXchange, Transport Attribute Definitions (TADs) define the metadata
The Transmission Control Protocol/Internet Protocol is a standard suite o
In eXchange, a Trading Partner (TP) has one or more Trading Partner Profi
User Interface.
A Uniform Resource Locator (URL) is a string that identifies information,
An Extensible Markup Language (XML) is a language whose syntax obeys
In IPQoS, the element that specifically defines the criteria to be applied t
A program that acts as a mail transport agent and uses a configuration fi
(Secure Hashing Algorithm) An algorithm that operates on any input leng
A set of hash algorithms with different block sizes, for example SHA-256
(Server Message Block) A protocol that enables clients to access files and
(service management facility) A feature that defines the relationships be
The process of creating severe network congestion or outages by using IC
To eavesdrop on computer network, frequently used as part of automate
(Simple Network Management Protocol) A protocol that provides a comm
(security policy database) A database that specifies the level of protectio
(security parameter index) An integer that specifies the row in the SADB
To gain unauthorized access to a computer by sending a message to it wi
(Single Root I/O Virtualization) A standard that enables efficient sharing o
(secure sockets layer) A form of secure low-level encryption that is used
The configurable proxy runs in kernel to accelerate web server communi
A physical interface that is used to carry data traffic only if some other ph
A packet filter that can monitor the state of active connections and use t
The process of a host generating its own IPv6 addresses by combining its
A process in which the system network administrator can manually add r
(Spanning Tree Protocol) A default protocol used by the bridged network
A logical subdivision of an IP network that connects systems with subnet
An encryption system in which the sender and receiver of a message sha
A form of PPP that runs over synchronous digital lines, which transfer da
A logical group containing an elastic virtual switch and its resources. The
An IP address in an IPMP group which must be used as the source or des
(Trivial File Transfer Protocol) A file transfer protocol that is used to trans
(transparent interconnection of lots of links) A protocol that is used by br
A link aggregation that is based on the IEEE 802.3ad standard. Trunk agg
In PPP, remote peers that a dial-in server grants access to by including th
(User Datagram Protocol) A protocol that a computer uses to send datag
An IPv6 address that identifies a single interface of an IPv6-enabled node

A datalink over which VNICs are created, when you use the Oracle Solari
(uniform resource indicator) An addressing technology that identifies res
(uniform resource locator) A string of characters that identifies a resourc
A 3-bit value that implements class-of-service (CoS) marks. CoS defines h
(UNIX-to-UNIX Copy Program) A program that enables computers to tran
(VSI Discovery and Configuration Protocol) A protocol used by EVB to exc
(virtual function) A SR-IOV function that is associated with a Physical Fun
A network that emulates a physical network and is a combination of hard
The point of attachment between the VNIC and an elastic virtual switch.
An entity that facilitates communication between virtual machines. The
(virtual local area network) A subdivision of a local area network at the d
(virtual LAN device) Network interfaces that provide traffic forwarding at
(virtual network identifier) VXLANs are identified by using VXLAN segmen
(virtual network interface card) An L2 entity or virtual network device tha
(virtual private network) A single, secure, logical network that uses tunne
(Virtual Router ID) A unique number used to identify a virtual router on a
(Virtual IP address) An IP address associated with a VRID from which oth
(Virtual Router Redundancy Protocol) A protocol that provides high avail
(virtual station instance) VSI refers to a VNIC that is configured on the sta
(virtual extensible local area network) An L2 and L3 technology that work
(Wireless Application Protocol) A standard protocol to access information
(wired equivalent privacy key) A key that establishes connections with a
The exit criteria that a component or system must satisfy in order to be
Formal testing with respect to user needs, requirements, and business p
Testing to determine the ease by which users with disabilities can use a
The capability of the sofware product to provide the right or agreed res
The behavior produced/observed when a component or system is tested
Testing carried out informally; no formal test preparation takes place, no
The capability of the sofware product to be adapted for different specifi
Testing practice for a project using agile methodologies, such as extreme
Simulated or actual operational testing by potential users/customers or
The capability of the sofware product to be diagnosed for deficiencies o
Any condition that deviates from expectation based on requirements sp
The capability of the sofware product to be attractive to the user. [ISO 9
An independent evaluation of sofware products or processes to ascerta
Testware used in automated testing, such as tool scripts.
The degree to which a component or system is operational and accessib
Testing in which two or more variants of a component or system are exe
A specification or sofware product that has been formally reviewed or a
A sequence of one or more consecutive executable statements containin
A set of test cases derived from the internal structure or specification to
The response of a component or system to a set of input values and pre
(1) A standard against which measurements or comparisons can be mad
Sofware developed specifically for a set of users or customers. The opp
A superior method or innovative practice that contributes to the improv
Operational testing by potential and/or existing users/customers at an e
A type of integration testing in which sofware elements, hardware elem
Documented procedure to derive and select test cases based on an anal
Testing, either functional or non-functional, without reference to the int
A test case that cannot be executed because the preconditions for its ex
An incremental approach to integration testing where the lowest level co
A black box test design technique in which test cases are designed based
The percentage of boundary values that have been exercised by a test su
An input value or output value which is on the edge of an equivalence p
The percentage of branches that have been exercised by a test suite. 10
A white box test design technique in which test cases are designed to ex
A basic block that can be selected for execution based on a program con
An approach to testing in which test cases are designed based on descri
A five level staged framework that describes the key elements of an effe
A framework that describes the key elements of an effective product de
A type of test execution tool where inputs are recorded during manual t
Acronym for Computer Aided Sofware Engineering.
Acronym for Computer Aided Sofware Testing. See also test automation
A graphical representation of inputs and/or stimuli (causes) with their as
A black box test design technique in which test cases are designed from
The process of confirming that a component, system or person complies
The capability of the sofware product to enable specified modifications
A black box test design technique in which test cases, described by mea
An analysis method that determines which parts of the sofware have b
The capability of the sofware product to co-exist with other independe
The degree to which a component or system has a design and/or interna
The process of testing to determine the compliance of component or sy
The capability of the sofware product to adhere to standards, conventio
Testing performed to expose defects in the interfaces and interaction be
A description of a component’s function in terms of its output values for
The testing of individual sofware components. [Afer IEEE 610]
A minimal sofware item that can be tested in isolation.
Two or more single conditions joined by means of a logical operator (AN
Testing to determine how the occurrence of two or more activities withi
The percentage of condition outcomes that have been exercised by a tes
The percentage of all single condition outcomes that independently affe
A white box test design technique in which test cases are designed to ex
The evaluation of a condition to True or False.
A white box test design technique in which test cases are designed to ex
A logical expression that can be evaluated as True or False, e.g. A>B. See
The function to check on the contents of libraries of configuration items
An element of configuration management, consisting of the evaluation,
An element of configuration management, consisting of selecting the co
An aggregation of hardware, sofware or both, that is designated for con
A discipline applying technical and administrative direction and surveilla
The composition of a component or system as defined by the number, n
The degree of uniformity, standardization, and freedom from contradicti
An abstract representation of all possible sequences of events (paths) in
Testing of sofware used to convert data from existing systems for use in
Acronym for Commercial Off-The-Shelf sofware.
Measurement of achieved coverage to a specified coverage item during
An entity or property used as a basis for test coverage, e.g. equivalence
A tool that provides objective measures of what structural elements, e.g
The degree, expressed as a percentage, to which a specified coverage ite
The number of independent paths through a program. Cyclomatic comp
An executable statement where a variable is assigned a value.
A scripting technique that stores test input and expected results in a tabl
A form of static analysis based on the definition and usage of variables.
The percentage of definition-use pairs that have been exercised by a test
A white box test design technique in which test cases are designed to exe
An abstract representation of the sequence and possible changes of the
A tool used by programmers to reproduce failures, investigate the state o
The process of finding, analyzing and removing the causes of failures in s
The percentage of all condition outcomes and decision outcomes that ha
A white box test design technique in which test cases are designed to exe
The percentage of decision outcomes that have been exercised by a test
The result of a decision (which therefore determines the branches to be
A black box test design techniques in which test cases are designed to ex
A table showing combinations of inputs and/or stimuli (causes) with thei
A white box test design technique in which test cases are designed to exe
A program point at which the control flow has two or more alternative ro
The number of defects identified in a component or system divided by th
the number of defects found by a test phase, divided by the number fou
The process of recognizing, investigating, taking action and disposing of d
An occurrence in which one defect prevents the detection of another. [A
A document reporting on any flaw in a component or system that can ca
A flaw in a component or system that can cause the component or system
The association of the definition of a variable with the use of that variab
Any (work) product that must be delivered to someone other that the (w
An approach to testing in which test cases are designed based on the arc
Testing of sofware or specification by manual simulation of its execution
Formal or informal testing conducted during the implementation of a com
Testing the quality of the documentation, e.g. user guide or installation g
The set from which valid input and/or output values can be selected.
A sofware component or test tool that replaces a component that takes
The process of evaluating behavior, e.g. memory performance, CPU usag
Comparison of actual and expected results, performed while the sofwar
Testing that involves the execution of the sofware of a component or sy
The process of testing to determine the efficiency of a sofware product.
The capability of the sofware product to provide appropriate performan
A black box test design techniques in which test cases are designed to ex
A device, computer program, or system that accepts the same inputs and
the set of generic and specific conditions for permitting a process to go f
The first executable statement within a component.
The percentage of equivalence partitions that have been exercised by a t
A portion of an input or output domain for which the behavior of a comp
A black box test design technique in which test cases are designed to exe
A test design technique where the experience of the tester is used to anti
The process of intentionally adding known defects to those already in th
The ability of a system or component to continue normal operation desp
A human action that produces an incorrect result. [Afer IEEE 610]
Behavior of a component or system in response to erroneous input, from
A statement which, when compiled, is translated into object code, and w
A program element is said to be exercised by a test case when the input
A test approach in which the test suite comprises all combinations of inp
The set of generic and specific conditions, agreed upon with the stakeho
The last executable statement within a component.
The behavior predicted by the specification, or another source, of the co
Testing where the tester actively controls the design of the tests as those
A test is deemed to fail if its actual result does not match its expected re
A systematic approach to risk identification and analysis of identifying po
The physical or functional manifestation of a failure. For example, a syste
The ratio of the number of failures of a given category to a given unit of m
Actual deviation of the component or system from its expected delivery,
The capability of the sofware product to maintain a specified level of pe
A method used to analyze the causes of faults (defects).
A path for which a set of input values and preconditions exists which cau
An attribute of a component or system specified or implied by requireme
A computational model consisting of a finite number of states and transi
A review characterized by documented procedures and requirements, e.
A test basis document that can only be amended by a formal change con
Method aiming to measure the size of the functionality of an information
An integration approach that combines the components or systems for th
A requirement that specifies a function that a component or system mus
Documented procedure to derive and select test cases based on an analy
Testing based on an analysis of the specification of the functionality of a
The process of testing to determine the functionality of a sofware produ
The capability of the sofware product to provide functions which meet s
See white box testing.
A static usability test technique to determine the compliance of a user in
A test case without concrete (implementation level) values for input data
The tracing of requirements for a test level through the layers of test doc
The assessment of change to the layers of development documentation,
A tool that facilitates the recording and status tracking of incidents found
The process of recognizing, investigating, taking action and disposing of i
A document reporting on any event that occurs during the testing which
Any event occurring during testing that requires investigation. [Afer IEEE
A development life cycle where a project is broken into a series of increm
Testing where components or systems are integrated and tested one or s
Separation of responsibilities, which encourages the accomplishment of
A path that cannot be exercised by any set of possible input values.
A review not based on a formal (documented) procedure.
The set from which valid input values can be selected.. See also domain.
An instance of an input. See also input.
A variable (whether stored within a component or outside) that is read b
A type of review that relies on visual examination of documents to detec
The process of testing the installability of a sofware product. See also po
The capability of the sofware product to be installed in a specified envir
Supplied instructions on any suitable media, which guides the installer th
Supplied sofware on any suitable media, which leads the installer throu
The insertion of additional code into the program in order to collect infor
A sofware tool used to carry out instrumentation.
A special instance of a smoke test to decide if the component or system
Testing performed to expose defects in the interfaces and in the interacti
The process of combining components or systems into larger assemblies
An integration test type that is concerned with testing the interfaces bet
The process of testing to determine the interoperability of a sofware pro
The capability of the sofware product to interact with one or more spec
Testing using input values that should be rejected by the component or s
Testing of individual components in isolation from surrounding compone
A scripting technique that uses data files to contain not only test data an
The percentage of LCSAJs of a component that have been exercised by a
A white box test design technique in which test cases are designed to exe
A Linear Code Sequence And Jump, consisting of the following three item
The capability of the sofware product to enable the user to learn its app
A test type concerned with measuring the behavior of a component or s
A test case with concrete (implementation level) values for input data an
The process of testing to determine the maintainability of a sofware pro
The ease with which a sofware product can be modified to correct defec
Testing the changes to an operational system or the impact of a changed
Modification of a sofware product afer delivery to correct defects, to im
A systematic evaluation of sofware acquisition, supply, development, op
(1) The capability of an organization with respect to the effectiveness and
The number or category assigned to an attribute of an entity by making a
A scale that constrains the type of data analysis that can be performed o
The process of assigning a number or category to an entity to describe an
A defect in a program’s dynamic store allocation logic that causes it to fa
A measurement scale and the method used for measurement. [ISO 1459
A point in time in a project at which defined (intermediate) deliverables a
The leader and main person responsible for an inspection or other review
A sofware tool or hardware device that run concurrently with the comp
The percentage of combinations of all single condition outcomes within
A white box test design technique in which test cases are designed to exe
A method to determine test suite thoroughness by measuring the extent
Tests aimed at showing that a component or system does not work. Nega
Non fulfillment of a specified requirement. [ISO 9000]
A requirement that does not relate to functionality, but to attributes of s
Methods used to design or select tests for nonfunctional testing.
Testing the attributes of a component or system that do not relate to fun
The percentage of sequences of N+1 transitions that have been exercised
A form of state transition testing in which test cases are designed to exec
A sofware product that is developed for the general market, i.e. for a lar
The capability of the sofware product to enable the user to operate and
Hardware and sofware products installed at users’ or customers’ sites w
Statistical testing using a model of system operations (short duration task
Testing conducted to evaluate a component or system in its operational e
The set from which valid output values can be selected. See also domain
An instance of an output. See also output.
A variable (whether stored within a component or outside) that is writte
A sofware development approach whereby lines of code (production an
Two testers work together to find defects. Typically, they share one comp
Decision rules used to determine whether a test item (function) or featu
A test is deemed to pass if its actual result matches its expected result.
The percentage of paths that have been exercised by a test suite. 100% p
Choosing a set of input values to force the execution of a given path.
A white box test design technique in which test cases are designed to exe
A sequence of events, e.g. executable statements, of a component or sys
A high level metric of effectiveness and/or efficiency used to guide and c
A tool to support performance testing and that usually has two main faci
The process of testing to determine the performance of a sofware produ
The degree to which a system or component accomplishes its designated
A test plan that typically addresses one test level.
The process of testing to determine the portability of a sofware product
The ease with which the sofware product can be transferred from one h
Environmental and state conditions that must be fulfilled afer the execu
Comparison of actual and expected results, performed afer the sofware
Environmental and state conditions that must be fulfilled before the com
The level of (business) importance assigned to an item, e.g. defect.
A black box test design technique in which test cases are designed toexe
A set of interrelated activities, which transform inputs into outputs. [ISO
A test plan that typically addresses multiple test levels.
A project is a unique set of coordinated and controlled activities with sta
A series which appears to be random but is in fact generated according t
Part of quality management focused on providing confidence that qualit
A feature or characteristic that affects an item’s quality. [IEEE 610]
Coordinated activities to direct and control an organization with regard t
The degree to which a component, system or process meets specified re
A black box test design technique where test cases are selected, possibly
The process of testing to determine the recoverability of a sofware prod
The capability of the sofware product to re-establish a specified level of
Testing of a previously tested program following modification to ensure t
A document identifying test items, their configuration, current status and
The process of testing to determine the reliability of a sofware product.
The ability of the sofware product to perform its required functions und
The capability of the sofware product to be used in place of another spe
A condition or capability needed by a user to solve a problem or achieve
A tool that supports the recording of requirements, requirements attribu
The period of time in the sofware life cycle during which the equiremen
An approach to testing in which test cases are designed based on test ob
The process of testing to determine the resource-utilization of a sofware
The capability of the sofware product to use appropriate amounts and t
The consequence/outcome of the execution of a test. It includes outputs
The testing activities that must be repeated when testing is re-started af
Testing that runs test cases that failed the last time they were run, in ord
An evaluation of a product or project status to ascertain discrepancies fro
The person involved in the review who shall identify and describe anoma
The process of assessing identified risks to estimate their impact and pro
The process through which decisions are reached and protective measur
The process of identifying risks using techniques such as brainstorming, c
Systematic application of procedures and practices to the tasks of identif
A factor that could result in future negative consequences; usually expre
Testing oriented towards exploring and providing information about prod
The degree to which a component or system can function correctly in the
An underlying factor that caused a non-conformance and possibly should
The process of testing to determine the safety of a sofware product.
The capability of the sofware product to achieve acceptable levels of ris
Testing to determine the scalability of the sofware product.
The capability of the sofware product to be upgraded to accommodate
The person who has to record each defect mentioned and any suggestio
A programming language in which executable test scripts are written, use
Testing to determine the security of the sofware product.
Attributes of sofware products that bear on its ability to prevent unauth
The degree of impact that a defect has on the development or operation
The representation of selected behavioral characteristics of one physical
A device, computer program or system used during testing, which behav
A subset of all defined/planned test cases that cover the main functional
The totality of functionality and features of a sofware product that bear
A questionnaire based usability test technique to evaluate the usability, e
A document that specifies, ideally in a complete, precise and verifiable m
See black box test design technique.
An input for which the specification predicts a result.
The capability of the sofware product to avoid unexpected effects from
A diagram that depicts the states that a component or system can assum
A grid showing the resulting transitions for each state combined with eac
A black box test design technique in which test cases are designed to exe
A transition between two states of a component or system.
The percentage of executable statements that have been exercised by a
A white box test design technique in which test cases are designed toexe
An entity in a programming language, which is typically the smallest indi
Analysis of sofware artifacts, e.g. requirements or code, carried out with
A tool that carries out static analysis.
Analysis of program source code carried out without execution of that so
A tool that carries out static code analysis. The tool checks source code, f
Testing of a component or system at specification or implementation leve
A test design technique in which a model of the statistical distribution of
An element of configuration management, consisting of the recording an
Testing conducted to evaluate a system or component at or beyond the l
Coverage measures based on the internal structure of the component.
See white box test design technique.
A skeletal or special-purpose implementation of a sofware component,
A sequence of executable statements within a component.
The capability of the sofware product to provide an appropriate set of fu
The criteria used to (temporarily) stop all or a portion of the testing activ
A black box test design technique in which test cases are designed based
Testing the integration of systems and packages; testing interfaces to ext
The process of testing an integrated system to verify that it meets specifi
A collection of components organized to accomplish a specific function o
A peer group discussion activity that focuses on achieving consensus on
The implementation of the test strategy for a specific project. It typically
The use of sofware to perform or support test activities, e.g. test manag
All documents from which the requirements of a component or system c
A document specifying a set of test cases (objective, inputs, test actions,
A set of input values, execution preconditions, expected results and exec
A statement of test objectives, and possibly test ideas. Test charters are a
A test tool to perform automated test comparison.
The process of identifying differences between the actual results produc
An item or event of a component or system that could be verified by one
A type of test tool that enables data to be selected from existing databas
Data that exists (for example, in a database) before a test is executed, an
A document specifying the test conditions (coverage items) for a test item
A method used to derive or select test cases.
A tool that support the test design activity by generating test inputs from
An environment containing hardware, instrumentation, simulators, sofw
A document produced at the end of the test process summarizing all tes
The use of sofware, e.g. capture/playback tools, to control the execution
The period of time in a sofware development life cycle during which the
A scheme for the execution of test procedures. The test procedures are i
The method used to perform the actual test execution, either manually o
A type of test tool that is able to execute other sofware using an automa
The process of running a test by the component or system under test, pr
A test environment comprised of stubs and drivers needed to conduct a
The organizational artifacts needed to perform testing, consisting of test
The individual element to be tested. There usually is one test object and
A group of test activities that are organized and managed together. A tes
A chronological record of relevant details about the execution of tests. [I
The process of recording information about tests executed into a test log
The planning, estimating, monitoring and control of test activities, typica
The person responsible for testing and evaluating a test object. The indiv
A five level staged framework for test process improvement, related to th
The component or system to be tested. See also test item.
A reason or purpose for designing and executing a test.
A source to determine expected results to compare with the actual resul
A metric, in general high level, indicating to what extent a certain target
A distinct set of test activities collected into a manageable phase of a pro
A document describing the scope, approach, resources and schedule of i
The activity of establishing or updating a test plan.
A formula based test estimation method based on function point analysi
A high level document describing the principles, approach and major obj
A document specifying a sequence of actions for the execution of a test.
See test procedure specification.
A continuous framework for test process improvement that describes the
The fundamental test process comprises planning, specification, executio
An attribute of a test indicating whether the same results are produced e
Execution of a test on a specific version of the test object.
Commonly used to refer to a test procedure specification, especially an a
A document that consists of a test design specification, test case specific
A high-level document defining the test levels to be performed and the t
A set of several test cases for a component or system under test, where t
A document summarizing testing activities and results. It also contains an
A set of exit criteria.
A sofware product that supports one or more test activities, such as pla
A group of test activities aimed at testing a component or system regardi
A detailed check of the test basis to determine whether the test basis is a
The capability of the sofware product to enable modified sofware to be
The degree to which a requirement is stated in terms that permit establis
A technically skilled professional who is involved in the testing of a comp
The process consisting of all life cycle activities, both static and dynamic,
Artifacts produced during the test process required to plan, design, and e
A version of component integration testing where the progressive integra
An incremental approach to integration testing where the component at
The ability to identify related items in documentation and sofware, such
A path by which the original input to a process (e.g. data) can be traced
The capability of the sofware product to enable the user to understand
Code that cannot be reached and therefore is impossible to execute.
Testing to determine the extent to which the sofware product is underst
The capability of the sofware to be understood, learned, used and attra
A black box test design technique in which test cases are designed to exe
A test whereby real-life users are involved to evaluate the usability of a c
Confirmation by examination and through provision of objective evidenc
An element of storage in a computer that is accessible by a sofware pro
Confirmation by examination and through the provision of objective evid
The tracing of requirements through the layers of development documen
A framework to describe the sofware development life cycle activities fr
Testing where the system is subjected to large volumes of data. See also
A step-by-step presentation by the author of a document in order to gath
Documented procedure to derive and select test cases based on an analy
Testing based on an analysis of the internal structure of the component o
An expert based test estimation technique that aims at making an accura
Formal agreement that an IT service, process, plan or other deliverable is
(Service Operation) The process responsible for allowing users to make u
(Service Strategy) A role that is very similar to that of the business relatio
(Service Strategy) The process responsible for identifying the actual costs
Officially authorized to carry out a role. For example, an accredited body
(Service Operation) Monitoring of a configuration item or an IT service th
A set of actions designed to achieve a particular result. Activities are usu
(Service Design) A synonym for service hours, commonly used in formal c
A document that describes a formal understanding between two or more
(Service Operation) A notification that a threshold has been reached, som
(Continual Service Improvement) (Service Design) (Service Strategy) A te
Sofware that provides functions which are required by an IT service. Eac
(Service Design) (Service Operation) The function responsible for manag
(Service Design) A database or structured document used to manage app
(Service Design) An external service provider that provides IT services us
(Service Design) The activity responsible for understanding the resource
(Service Design) The structure of a system or IT service, including the rela
(Service Transition) A configuration item (CI) that is made up of a numbe
Inspection and analysis to check whether a standard or set of guidelines
(Service Strategy) Any resource or capability. The assets of a service prov
(Service Transition) A generic activity or process responsible for tracking
(Service Transition) A list of fixed assets that includes their ownership an
(Service Strategy) One or more attributes of an asset that make it particu
(Service Transition) A piece of information about a configuration item. Ex
Formal inspection and verification to check whether a standard or set of
See RACI.
(Service Operation) Use of information technology to direct an incoming
(Service Design) Ability of an IT service or other configuration item to pe
(Service Design) The process responsible for defining, analysing, planning
(Service Design) A set of tools, data and information that are used to sup
(Service Design) A plan to ensure that existing and future availability requ
(Service Transition) An activity that restores a service or other configurati
(Service Design) (Service Operation) Copying data to protect against loss
(Continual Service Improvement) A management tool developed by Drs R
(Continual Service Improvement) (service Transition) A snapshot that is u
(Continual Service Improvement) A baseline that is used to compare rela
(Continual Service Improvement) A technique that compares a benchma
Proven activities or processes that have been successfully used by multip
(Service Design) (Service Operation) A technique that helps a team to ge
The UK national standards body, responsible for creating and maintaining
A list of all the money an organization or business unit plans to receive, a
The activity of predicting and controlling the spending of money. Budgeti
(Service Transition) The activity of assembling a number of configuration
(Service Transition) A controlled environment where applications, IT serv
(Service Strategy) An overall corporate entity or organization formed of a
(Service Design) In the context of ITSM, business capacity management i
(Service Strategy) Justification for a significant item of expenditure. The b
(Service Design) The business process responsible for managing risks tha
(Service Design) A plan defining the steps required to restore business pr
(Service Strategy) A recipient of a product or a service from the business
(Service Strategy) Business impact analysis is the activity in business con
(Service Strategy) The objective of a business process, or of the business
(Service Strategy) The day-to-day execution, monitoring and managemen
(Continual Service Improvement) An understanding of the service provid
A process that is owned and carried out by the business. A business proc
(Service Strategy) The process responsible for maintaining a positive rela
(Service Strategy) A role responsible for maintaining the relationship with
A service that is delivered to business customers by business units. For e
The management of business services delivered to business customers.
(Service Strategy) A segment of the business that has its own plans, metr
(Service Operation) A telephone call to the service desk from a user. A ca
(Service Operation) An organization or business unit that handles large n
(Service Operation) A category that is used to distinguish incoming reque
(Service Strategy) The ability of an organization, person, process, applica
(Continual Service Improvement) Capability maturity model® integration
(Service Design) The maximum throughput that a configuration item or I
(Service Design) The process responsible for ensuring that the capacity o
(Service Design) A set of tools, data and information that are used to sup
(Service Design) A capacity plan is used to manage the resources require
(Service Design) The activity within capacity management responsible fo
(Service Strategy) The cost of purchasing something that will become a fi
(Service Strategy) An asset that is of interest to financial management be
(Service Strategy) Identifying major cost as capital, even though no asset
A named group of things that have something in common. Categories ar
Issuing a certificate to confirm compliance to a standard. Certification inc
(Service Transition) The addition, modification or removal of anything tha
(Service Transition) A group of people that support the assessment, prior
(Service Transition) The process responsible for formal assessment of a n
(Service Transition) Information about all changes made to a configuratio
(Service Transition) The process responsible for controlling the lifecycle o
(Service Transition) A repeatable way of dealing with a particular categor
(Service Strategy) (Service Transition) A document that includes a high le
(Service Transition) A record containing the details of a change. Each cha
See request for change.
(Service Transition) A document that lists all authorized changes and the
(Service Transition) A regular, agreed time when changes or releases may
(Service Strategy) Requiring payment for IT services. Charging for IT servi
(Service Strategy) (Service Design) A document that contains details of a
(Service Operation) A technique used to help identify possible causes of
(Service Transition) A category that is used to classify configuration items
The act of assigning a category to something. Classification is used to ens
A generic term that means a customer, the business or a business custom
(Service Operation) The final status in the lifecycle of an incident, problem
(Service Operation) The act of changing the status of an incident, problem
(Continual Service Improvement) Control OBjectives for Information and
A guideline published by a public body or a standards organization, such
See gradual recovery.
(Service Design) Pre-existing application sofware or middleware that can
Ensuring that a standard or set of guidelines is followed, or that proper, c
A general term that is used to mean one part of something more comple
(Continual Service Improvement) (Service Design) The sub-process of cap
(Service Transition) A configuration item that is part of an assembly. For e
(Service Design) A technique that helps to identify the impact of configur
(Service Operation) Computer telephony integration is a general term co
A measure of the number of users engaged in the same operation at the
(Service Design) A security principle that requires that data should only b
(Service Transition) A generic term, used to describe a group of configura
(Service Transition) The baseline of a configuration that has been formall
(Service Transition) The activity responsible for ensuring that adding, mo
(Service Transition) The activity responsible for collecting information ab
(Service Transition) Any component or other service asset that needs to
(Service Transition) The process responsible for maintaining information
(Service Transition) A database used to store configuration records throu
(Service Transition) A set of tools, data and information that are used to
(Service Transition) A record containing the details of a configuration item
(Service Transition) The hierarchy and other relationships between all the
(Continual Service Improvement) A stage in the lifecycle of an IT service a
(Service Design) An approach or design to achieve 100% availability. A co
(Service Design) An approach or design to eliminate planned downtime o
A legally binding agreement between two or more parties.
A means of managing a risk, ensuring that a business objective is achieve
See COBIT.
(Service Strategy) An approach to the management of IT services, proces
The ISO/IEC 20000 process group that includes change management and
(Service Strategy) An IT service that delivers basic outcomes desired by o
(Service Strategy) A detailed description of a core service that may be sh
The amount of money spent on a specific activity, IT service or business u
An activity that analyses and compares the costs and the benefits involve
(Service Strategy) A business unit or project to which costs are assigned.
(Service Strategy) The middle level of category to which costs are assigne
(Service Strategy) A general term that is used to refer to budgeting and a
(Service Strategy) The highest level of category to which costs are assigne
(Service Strategy) The lowest level of category to which costs are assigne
A measure of the balance between the effectiveness and cost of a servic
Can be used to refer to any type of control. The term is most ofen used
Changes made to a plan or activity that has already started to ensure tha
A methodology and tool for analysing and managing risks. CRAMM was d
Crisis management is the process responsible for managing the wider im
Something that must happen if an IT service, process, plan, project or ot
(Continual Service Improvement) A database or structured document use
A set of values that is shared by a group of people, including expectation
Someone who buys goods or services. The customer of an IT service prov
(Service Strategy) A database or structured document used to manage se
(Service Design) An IT service that is visible to the customer. These are no
(Service Strategy) A database or structured document used to record all
(Service Operation) A graphical representation of overall IT service perfo
A way of understanding the relationships between data, information, kno
(Service Transition) One or more locations in which the definitive and au
Something that must be provided to meet a commitment in a service lev
Activities that understand and influence customer demand for services a
See Plan–Do–Check–Act.
The direct or indirect reliance of one process or activity on another.
(Service Transition) The activity responsible for movement of new or cha
(Service Strategy) A measure of the reduction in value of an asset over it
(Service Design) An activity or process that identifies requirements and t
(Service Design) The process responsible for coordinating all service desi
(Service Operation) A stage in the incident lifecycle. Detection results in t
(Service Design) The process responsible for creating or modifying an IT s
(Service Design) An environment used to create or modify IT services or
(Service Operation) A stage in the incident and problem lifecycles. The pu
(Service Operation) A structured set of questions used by service desk st
A technique used to support demand management by charging different
(Service Strategy) The cost of providing an IT service which can be alloca
(Service Operation) An application that manages information about IT in
Information in readable form. A document may be paper or electronic –
(Service Design) (Service Operation) The time when an IT service or othe
Something that influences strategy, objectives or requirements – for exam
(Service Transition) A stage in the service lifecycle at the end of deploym
(Service Strategy) The reduction in average cost that is possible from incr
(Service Strategy) The reduction in cost that is allocated to an IT service b
(Continual Service Improvement) A measure of whether the objectives o
(Continual Service Improvement) A measure of whether the right amoun
(Service Transition) A change that must be introduced as soon as possibl
(Service Transition) A subgroup of the Change Advisory Board that make
(Service Transition) A subset of the IT infrastructure that is used for a par
(Service Operation) A design flaw or malfunction that causes a failure of
(Service Operation) An activity that obtains additional resources when th
(Service Strategy) A framework to help organizations in their analysis and
(Service Strategy) A framework to help IT service providers develop their
The use of experience to provide an approximate value for a metric or co
(Service Operation) A change of state that has significance for the manag
(Service Operation) The process responsible for managing events throug
A document containing details of one or more key performance indicator
Detailed stages in the lifecycle of an incident. The stages are detection, d
A customer who works for a different business from the IT service provid
A metric that is used to measure the delivery of IT service to a customer.
(Service Strategy) An IT service provider that is part of a different organiz
See outsourcing.
(Service Operation) The function responsible for managing the physical e
(Service Operation) Loss of ability to operate to specification, or to delive
An approach to assessing the potential impact of failures. It involves ana
(Service Design) A recovery option that is also known as hot standby. Fas
See error.
(Service Design) The ability of an IT service or other configuration item to
(Continual Service Improvement) (Service Design) A technique that can b
(Service Strategy) The function and processes responsible for managing a
(Service Operation) The first level in a hierarchy of support groups involv
See Ishikawa diagram.
An informal term used to describe a process, configuration item, IT servic
(Service Transition) A tangible asset of a business that has a long term us
(Service Transition) The process responsible for tracking and reporting th
(Service Strategy) A cost that does not vary with IT service usage – for ex
(Service Design) A permanent building, available for use when needed by
(Service Operation) A methodology for using service desks and support g
Performing activities to meet a need or requirement – for example, by pr
A team or group of people and the tools they use to carry out one or mo
(Service Operation) Transferring an incident, problem or change to a tech
(Continual Service Improvement) An activity that compares two sets of d
Ensuring that policies and strategy are actually implemented, and that re
(Service Design) A recovery option that is also known as cold standby. Gr
A document describing best practice, which recommends what should b
(Service Operation) A point of contact for users to log incidents. A help d
(Service Operation) Informing or involving more senior levels of managem
(Service Design) An approach or design that minimizes or hides the effec
See fast recovery; immediate recovery.
(Service Operation) A unique name that is used to identify a user, person
(Service Design) A recovery option that is also known as hot standby. Pro
(Service Operation) (Service Transition) A measure of the effect of an inc
(Service Operation) An unplanned interruption to an IT service or reducti
(Service Operation) The process responsible for managing the lifecycle o
(Service Operation) A record containing the details of an incident. Each in
(Service Strategy) The cost of providing an IT service which cannot be all
(Service Design) The process that ensures the confidentiality, integrity an
(Service Design) The framework of policy, processes, functions, standard
(Service Design) The policy that governs the organization’s approach to in
The use of technology for the storage, communication or processing of in
A type of supporting service that provides hardware, network or other d
See insourcing.
(Service Design) A security principle that ensures data and configuration
(Service Operation) A form of automatic call distribution that accepts use
(Service Design) A recovery option that is also known as warm standby. I
A customer who works for the same business as the IT service provider.
A metric that is used within the IT service provider to monitor the efficie
(Service Strategy) A technique used to help make decisions about capital
(Service Strategy) An IT service provider that is part of the same organiza
(Service Strategy) Using an internal service provider to manage IT service
The International Organization for Standardization (ISO) is the world’s lar
See International Organization for Standardization.
An external service provider that provides access to the internet. Most IS
(Service Design) Initiation of the steps defined in a plan – for example, in
(Continual Service Improvement) (Service Operation) A technique that h
A generic term that refers to a number of international standards and gu
An international standard for quality management systems.
(Continual Service Improvement) ISO code of practice for information se
ISO specification and code of practice for IT service management. ISO/IE
(Continual Service Improvement) (Service Design) ISO specification for in
(Continual Service Improvement) Senior management within a service pr
All of the hardware, sofware, networks, facilities etc. that are required t
A set of best-practice guidance for IT service management. ITIL is owned
(Service Operation) Activities carried out by IT operations control, includ
(Service Operation) The function responsible for monitoring and control
(Service Operation) The function within an IT service provider that perfo
A service provided by an IT service provider. An IT service is made up of a
(Service Design) The process responsible for managing risks that could se
(Service Design) A plan defining the steps required to recover one or mo
The implementation and management of quality IT services that meet th
The IT Service Management Forum is an independent organization dedic
(Service Strategy) A service provider that provides IT services to internal
A formal group that is responsible for ensuring that business and IT servi
A document that defines the roles, responsibilities, skills and knowledge
(Service Operation) Planning and managing the execution of sofware tas
(Service Strategy) A model developed by Noriaki Kano that is used to hel
(Continual Service Improvement) (Service Operation) A structured appro
(Continual Service Improvement) (Service Design) A metric that is used t
(Service Transition) A logical database containing data used by the servic
(Service Transition) The process responsible for sharing perspectives, ide
(Service Operation) A problem that has a documented root cause and a w
(Service Operation) A database containing all known error records. This d
(Service Operation) A record containing the details of a known error. Eac
The various stages in the life of an IT service, configuration item, incident
(Service Strategy) A core service or supporting service that has multiple s
(Service Transition) Refers to an IT service or other configuration item tha
(Service Transition) A controlled environment containing live configuratio
An informal measure of how easily and effectively an IT service or other
(Service Design) A measure of how quickly and effectively an IT service o
(Service Operation) The highest category of impact for an incident. A ma
(Service Strategy) A perspective on IT services that emphasizes the fact t
Information that is used to support decision making by managers. Manag
The OGC methodology for managing risks. It includes all the activities req
The framework of policy, processes, functions, standards, guidelines and
A workaround that requires manual intervention. Manual workaround is
(Service Strategy) The increase or decrease in the cost of producing one
(Service Strategy) All opportunities that an IT service provider could expl
(Continual Service Improvement) A measure of the reliability, efficiency a
A named level in a maturity model, such as the Carnegie Mellon capabili
(Service Design) A metric for measuring and reporting reliability. MTBF is
(Service Design) A metric used for measuring and reporting reliability. It i
The average time taken to repair an IT service or other configuration item
The average time taken to restore an IT service or other configuration ite
(Continual Service Improvement) Something that is measured and repor
(Service Design) Sofware that connects two or more sofware compone
The mission statement of an organization is a short but complete descrip
A representation of a system, process, IT service, configuration item etc.
A technique that is used to predict the future behaviour of a system, pro
(Service Operation) Monitoring the output of a task, process, IT service o
(Service Operation) Repeated observation of a configuration item, IT serv
(Service Strategy) Provision of services from a country near the country w
(Service Strategy) A technique used to help make decisions about capital
(Service Transition) A change that is not an emergency change or a stand
(Service Operation) An operational state where services and configuratio
(Service Strategy) An approach to charging for IT services. Charges to cus
The outcomes required from a process, activity or organization in order t
See commercial off the shelf.
OGC is a UK government department that supports the delivery of the go
(Service Strategy) Provision of services from a location outside the count
(Service Strategy) Provision of services from a location within the countr
To perform as expected. A process or configuration item is said to operat
(Service Operation) Day-to-day management of an IT service, system or o
The lowest of three levels of planning and delivery (strategic, tactical, op
The cost resulting from running the IT services, which ofen involves repe
See operational cost.
(Continual Service Improvement) (Service Design) An agreement betwee
(Service Operation) A physical location where IT services and IT infrastru
See IT operations control.
See IT operations management.
(Service Strategy) A cost that is used in deciding between investment cho
Review, plan and request changes, in order to obtain the maximum effici
A company, legal entity or other institution. The term is sometimes used
The result of carrying out an activity, following a process, or delivering an
(Service Strategy) Using an external service provider to manage IT servic
See indirect cost.
(Service Operation) A technique used to help identify the business impac
(Service Operation) A technique used to prioritize activities. The pareto p
A relationship between two organizations that involves working closely t
(Service Operation) Monitoring of a configuration item, an IT service or a
(Service Strategy) A workload profile of one or more business activities. P
(Service Design) The amount of time that a component is busy over a giv
A measure of what is achieved or delivered by a system, person, team, p
(Service Strategy) An approach to organizational culture that integrates, a
(Continual Service Improvement) The process responsible for day-to-day
(Service Transition) A limited deployment of an IT service, a release or a
A detailed proposal that describes the activities and resources needed to
(Continual Service Improvement) A four-stage cycle for process managem
(Service Design) Agreed time when an IT service will not be available. Pla
An activity responsible for creating one or more plans – for example, cap
Formally documented management expectations and intentions. Policies
(Service Design) A prefabricated building, or a large vehicle, provided by
A review that takes place afer a change or a project has been implemen
A way of working, or a way in which work must be done. Practices can in
An activity that needs to be completed, or a condition that needs to be m
(Service Strategy) Pricing is the activity for establishing how much custom
The standard UK government methodology for project management. See
(Service Operation) (Service Transition) A category used to identify the re
(Service Operation) Monitoring that looks for patterns of events to predi
(Continual Service Improvement) (Service Operation) Part of the problem
(Service Operation) A cause of one or more incidents. The cause is not us
(Service Operation) The process responsible for managing the lifecycle o
(Service Operation) A record containing the details of a problem. Each pr
A document containing steps that specify how to achieve an activity. Pro
A structured set of activities designed to accomplish a specific objective.
The activity of planning and regulating a process, with the objective of p
A role responsible for the operational management of a process. The pro
A role accountable for ensuring that a process is fit for purpose. The proc
See live environment.
(Service Strategy) A business unit that charges for services provided. A pr
A template or example document containing sample data that will be rep
A number of projects and activities that are planned and managed toget
A temporary organization, with people and other assets, that is required
A project management standard maintained and published by the Projec
(Service Transition) A document that identifies the effect of planned chan
See PRINCE2.
(Service Transition) An activity that ensures that the IT infrastructure is a
The ability of a product, service or process to provide the intended value
(Service Transition) The process responsible for ensuring that the quality
(Continual Service Improvement) The framework of policy, processes, fun
(Continual Service Improvement) An improvement activity that is expect
(Continual Service Improvement) (Service Design) A model used to help
(Service Operation) Monitoring that takes place in response to an event.
(Service Design) A recovery option. An agreement between two organiza
A document containing the results or other output from a process or acti
(Service Design) (Service Operation) Returning a configuration item or an
(Service Design) A strategy for responding to an interruption to service. C
(Service Operation) The maximum amount of data that may be lost when
(Service Operation) The maximum time allowed for the recovery of an IT
Use of one or more additional configuration items to provide fault tolera
A connection or interaction between two people or things. In business re
The ISO/IEC 20000 process group that includes business relationship man
(Service Transition) One or more changes to an IT service that are built, t
(Service Transition) The process responsible for planning, scheduling and
(Service Transition) A naming convention used to uniquely identify a rele
(Service Transition) See release and deployment management.
(Service Operation) A repeatable way of dealing with a particular categor
(Service Transition) A set of configuration items that will be built, tested
The name used by ISO/IEC 20000 for the process group that includes rele
(Service Transition) A record that defines the content of a release. A relea
(Service Transition) Components of an IT service that are normally releas
See change window.
(Continual Service Improvement) (Service Design) A measure of how lon
(Service Transition) Actions taken to recover afer a failed change or relea
(Service Operation) The replacement or correction of a failed configurati
(Service Transition) A formal proposal for a change to be made. It include
(Service Operation) The process responsible for managing the lifecycle o
(Service Design) A formal statement of what is needed – for example, a s
(Service Design) The ability of an IT service or other configuration item to
(Service Operation) Action taken to repair the root cause of an incident o
The ISO/IEC 20000 process group that includes incident and problem ma
(Service Strategy) A generic term that includes IT infrastructure, people,
A measure of the time taken to complete an operation or transaction. Us
A measurement of the time taken to respond to something. This could b
See restore.
(Service Operation) Taking action to return an IT service to the users afe
(Service Transition) Permanent removal of an IT service, or other configu
(Service Strategy) A measurement of the profitability of a business unit o
(Continual Service Improvement) (Service Strategy) A measurement of th
(Service Design) The phase of an IT service continuity plan during which
An evaluation of a change, problem, process, project etc. Reviews are typ
(Service Operation) Entitlements, or permissions, granted to a user or ro
A possible event that could cause harm or loss, or affect the ability to ach
The initial steps of risk management: analysing the value of assets to the
The process responsible for identifying, assessing and controlling risks. R
A set of responsibilities, activities and authorities assigned to a person or
(Service Operation) The underlying or original cause of an incident or pro
(Service Operation) An activity that identifies the root cause of an incide
See operational costs.
Definition
The ability of an IT service, process, configuration item etc. to perform it
The boundary or extent to which a process, procedure, certification, con
(Service Operation) The second level in a hierarchy of support groups inv
See information security management.
See information security management.
(Service Design) A set of tools, data and information that are used to sup
See information security policy.
(Service Strategy) An approach to designing a solution or IT service that d
(Service Operation) A computer that is connected to a network and prov
A means of delivering value to customers by facilitating outcomes custom
(Service Transition) A set of criteria used to ensure that an IT service mee
(Service Strategy) A technique used in the assessment of the business im
Any capability or resource of a service provider. See also
(Service Transition) The process responsible for ensuring that assets requ
(Continual Service Improvement) (Service Design) The sub-process of cap
(Service Design) A database or structured document with information ab
See change
See charter
See IT service continuity management.
(Service Strategy) A contract to deliver one or more IT services. The term
A customer-oriented culture. The major objectives of a service culture ar
(Service Design) A stage in the lifecycle of an IT service. Service design in
(Service Design) Document(s) defining all aspects of an IT service and its
(Service Operation) The single point of contact between the service prov
(Service Design) An activity that identifies underlying causes of one or m
(Continual Service Improvement) (Service Design) An agreed time period
(Continual Service Improvement) A formal plan to implement improveme
(Service Transition) A set of tools and databases that are used to manage
Measured and reported achievement against one or more service level t
(Continual Service Improvement) (Service Design) An agreement betwee
(Continual Service Improvement) (Service Design) The process responsib
(Service Strategy) A defined level of utility and warranty for a particular s
(Continual Service Improvement) (Service Design) A customer requireme
(Continual Service Improvement) (Service Design) A commitment that is
See service management lifecycle.
(Service Operation) The expected time that a configuration item will be u
A set of specialized organizational capabilities for providing value to custo
An approach to IT service management that emphasizes the importance
A generic term for any manager within the service provider. Most comm
(Service Strategy) A model that shows how service assets interact with cu
(Service Operation) A stage in the lifecycle of an IT service. Service opera
(Continual Service Improvement) A role responsible for managing one or
(Service Strategy) A detailed description of an IT service that is available
(Service Strategy) A database or structured document listing all IT service
(Service Strategy) The complete set of services that are managed by a se
(Service Strategy) The process responsible for managing the service port
(Service Strategy) The total possible value of the overall capabilities and
(Service Strategy) An organization supplying services to one or more inte
(Service Strategy) An interface between the IT service provider and a use
(Service Strategy) Analysing the finances and constraints of an IT service
(Continual Service Improvement) The process responsible for producing
(Service Operation) A formal request from a user for something to be pro
(Service Strategy) The strategy and approach for deciding whether to pro
(Service Strategy) The title of one of the core ITIL publications. Service st
(Service Transition) A stage in the lifecycle of an IT service. Service transi
(Service Transition) The process responsible for validation and testing of
(Service Strategy) A measurement of the total cost of delivering an IT ser
(Continual Service Improvement) (Service Design) The ability of a third-p
(Continual Service Improvement) The process responsible for defining an
(Service Operation) A group or team of people who carry out a specific ro
(Continual Service Improvement) (Service Design) A technique that creat
(Service Operation) Providing a single consistent way to communicate wi
(Service Design) Any configuration item that can cause an incident when
(Continual Service Improvement) A service level agreement monitoring c
(Continual Service Improvement) (Service Design) An acronym for helpin
(Continual Service Improvement) (Service Transition) The current state o
(Service Transition) The process responsible for tracking and reporting th
See service sourcing.
A formal definition of requirements. A specification may be used to defin
All people who have an interest in an organization, project, IT service etc
A mandatory requirement. Examples include ISO/IEC 20000 (an internati
(Service Transition) A pre-authorized change that is low risk, relatively co
(Service Operation) Procedures used by IT operations management.
(Service Design) Used to refer to resources that are not required to delive
(Service Design) A document containing all requirements for a product p
The name of a required field in many types of record. It shows the curren
(Service Transition) The activity responsible for recording and reporting t
(Service Operation) The process responsible for managing the storage an
(Service Strategy) The highest of three levels of planning and delivery (st
(Service Strategy) A strategic plan designed to achieve defined objectives
(Service Strategy) The process responsible defining and maintaining an o
(Service Operation) A user who helps other users, and assists in commun
(Service Design) (Service Strategy) A third party responsible for supplying
(Service Design) A set of tools, data and information that are used to sup
(Service Design) The process responsible for ensuring that all contracts w
(Service Strategy) The activities in a value chain carried out by suppliers.
(Service Operation) A group of people with technical skills. Support grou
(Service Design) (Service Operation) The times or hours when support is
(Service Design) An IT service that is not directly used by the business, bu
(Continual Service Improvement) A technique that reviews and analyses
A number of related things that work together to achieve an overall obje
The part of IT service management that focuses on the management of I
The middle of three levels of planning and delivery (strategic, tactical, op
(Service Strategy) A short code used to identify a category. For example,
(Service Operation) The function responsible for providing technical skills
(Continual Service Improvement) A technique used in service improveme
See technical management.
(Continual Service Improvement) A set of related metrics, in which impro
(Service Design) A document specifying the requirements, scope, deliver
(Service Transition) An activity that verifies that a configuration item, IT s
(Service Transition) A controlled environment used to test configuration i
A person, organization or other entity that is not part of the service prov
(Service Operation) The third level in a hierarchy of support groups involv
A threat is anything that might exploit a vulnerability. Any potential cause
The value of a metric that should cause an alert to be generated or mana
(Service Design) A measure of the number of transactions or other opera
(Service Strategy) A methodology used to help make investment decision
(Service Strategy) A methodology used to help make investment and ser
(Continual Service Improvement) A methodology for managing continua
A discrete function performed by an IT service – for example, transferrin
(Service Transition) A change in state, corresponding to a movement of a
(Service Transition) The process responsible for planning all service trans
(Continual Service Improvement) Analysis of data to identify time-related
The activity responsible for planning changes to make the most efficient
(Service Strategy) An internal service provider that is embedded within a
(Service Strategy) An internal service provider that provides shared IT ser
(Service Strategy) A service provider that provides IT services to external
(Service Design) A contract between an IT service provider and a third pa
(Service Strategy) The cost to the IT service provider of providing a single
(Service Design) (Service Transition) A measure of how long it will be unti
(Service Design) The ease with which an application, product or IT servic
(Service Design) A technique used to define required functionality and o
A person who uses the IT service on a day-to-day basis. Users are distinc
(Service Strategy) A pattern of user demand for IT services. Each user pro
(Service Strategy) The functionality offered by a product or service to me
(Service Transition) An activity that ensures a new or changed IT service,
(Service Strategy) A sequence of processes that creates a product or serv
An informal measure of cost-effectiveness. Value for money is ofen base
(Service Strategy) A complex set of relationships between two or more g
(Continual Service Improvement) A measurement of the expected benefi
(Service Strategy) A cost that depends on how much the IT service is use
(Service Strategy) A technique used to understand how overall costs are
The difference between a planned value and the actual measured value.
(Service Transition) An activity that ensures that a new or changed IT ser
(Service Transition) The activities responsible for ensuring that informatio
(Service Transition) A version is used to identify a specific baseline of a co
A description of what the organization intends to become in the future. A
(Service Design) Part of a business process that is critical to the success o
A weakness that could be exploited by a threat – for example, an open fi
See intermediate recovery.
(Service Strategy) Assurance that a product or service will meet agreed r
A status that means activities have started but are not yet complete. It is
A document containing detailed instructions that specify exactly what ste
(Service Operation) Reducing or eliminating the impact of an incident or
The resources required to deliver an identifiable part of an IT service. Wo

define business processes


. This document describes integration scenarios, support
ti-Factor Authentication. See MFA.
ystem accessed by a 3270 terminal device. Typically, 3270 applications run under CICS or IMS.
odes, orders, attributes, and data or structured fields for 3270 devices that are transmitted between an application program and a terminal. Data being tran
a program running from the z/OS shell send and receive a 3270 data stream or issue TSO/E commands.

n a program ends abnormally.
system because of an error condition that cannot be resolved by recovery facilities while the task is performed. See abnormal termination.
essing prior to scheduled termination. (2) A system failure or operator action that causes a job to end unsuccessfully. Synonymous with abend, abnormal en
ntax Notation One Jump .
distribution libraries. This is done with the ACCEPT command.
sed to install SYSMODs in the distribution libraries.

en successfully installed by the SMP/E ACCEPT command. Accepted SYSMODs do not have the ERROR flag set and are found as SYSMOD entries in the
se use a resource. Access to protected resources is usually controlled by system software.
a request for a type of access to protected resources. In RACF®, the access authorities are NONE, READ, UPDATE, ALTER, and EXECUTE.
g that the resources of a computer system can be accessed only by authorized users in authorized ways.
ication control block.
a security descriptor (called an access control list or ACL). Specifies permissions granted or denied to trustees for the resource to which th

Control Entries (ACE's) that specify the security applied to a resource.

ed users and their access authorities.
 between main storage and I/O devices.
tion: atomicity, consistency, isolation, and durability. In CICS®, the ACID properties apply to a unit of work (UoW).

achine. A family of processors based on RISC architecture originally developed by Acorn Computers (now ARM Holdings). The RISC based d

ee Active Directory Administrative Center: Getting Started Jump .


enamed Active Directory Lightweight Directory Services (AD LDS).
tive Directory-Based Activation Overview Jump .
Active Directory Certificate Services (AD CS) Overview.
of's directory service product. See Active Directory Domain Services (AD DS) Overview.
Active Directory Federation Services (AD FS) Overview.
rvices. This used to be called Active Directory Application Mode, or ADAM. A database for directory-enabled applications that do not need
o facilitate migration and restructuring tasks in an Active Directory Domain Services infrastructure. See ADMT Guide: Migrating and Restruc
vices. See Active Directory Rights Management Services Overview Jump .
ry of routines that provide an interface to various directory namespaces, such as Active Directory, the Windows NT SAM account database,
e MMC snap-in used to manage objects in Active Directory. Besides users and computers, you can also use this tool to manage contacts, gr
s service that provides a Web interface to Active Directory domains, Active Directory Lightweight Directory Services instances, and Active D
gine for dynamically generated web pages. Superseded by ASP.NET
ed on the Common Language Runtime (CLR) to build dynamic web applications and services using any supported .NET language. Successor
OLE-DB provider that allows database queries of Active Directory using ADO. Active Directory searches using ADO are only allowed in the L
device, workstation or system connected to a network.
that provides dynamic mapping between IP addresses and the Ethernet addresses. ARP is used with IPv4 networks only. IPv6 networks use

storage addresses that the system creates for the user, batch job, or system task. In z/OS, an address space can range up to 16 exabytes of contiguous vi
ws api that allows a 32-bit sofware application to access more physical memory than it has virtual address space. See Address Windowing
bute that refers to the address length that is expected to be in effect when the program is entered. In z/OS, addresses can be 24, 31, or 64 bits in length.
ation directly connected to a given node by a link connection over which network traffic can be carried.
d to another node by at least one path that connects no other node. (2) In OSI, a node that is attached to the same subnetwork as the local node. An adjace
one or more links to another subarea with no intervening subareas. See subarea.

nits (preview) | Graph API concepts Jump .


nistrative tasks such as access authorization and content management. Administrators can also grant levels of authority to users.
etric 128-bit block data encryption technique. AES is the U.S. government encryption standard.
ation for the encryption of electronic data used by Kerberos. Supercedes the Data Encryption Standard (DES).

PN). An extension to SNA featuring: (a) greater distributed network control that avoids critical hierarchical dependencies, thereby isolating the effects of sing

cation (APPC). An implementation of the SNA LU 6.2 protocol that allows interconnected systems to communicate and share the processing of programs.


adapter that allows a computer to communicate with a peripheral bus. See Parallel ATA Jump . Also the Advanced Threat Analysis.
ws Defender Advanced Threat Protection Jump .
me audible or visual indication that an error or some other event has occurred.
and one or more aliases may be used to refer to the same data element or point in a computer program.

orming a specific task.
ommand that serves as the connection between a file's logical name (the ddname) and the file's physical name (the data set name).

to the correct URLs during their interaction with Microsof Office SharePoint Server. See Plan alternate access mappings (Office SharePoint
Services Jump .
search algorithm in Active Directory that allows you to specify complex LDAP syntax filters involving multiple naming-related attributes in

ogged in to the portal with a valid user ID and password.

n an IBM system control program or licensed program that affects a specific user. An APAR fix is usually replaced later by a permanent correction called a P

on using the authorized program facility (APF) that allows an installation to identify system or user programs that can use sensitive system functions. To ma
at performs a task; some examples are payroll, inventory management, and word processing applications.
connection (OSI) reference model, the layer that provides means for application processes residing in open systems to exchange information and that conta
Microsof Application Lifecycle Management Jump .
iew [AX 2012] Jump .
e components used to perform specific types of work on a computer, such as a program that does inventory control or payroll.
Application programming interface Jump .
he Application Request Routing Module Jump .

A activated by an application that explicitly issues a bind() function call to the IP address.
SPlex® configuration, a CICS region devoted to running applications.
arget libraries. This is done with the APPLY command.
d to install SYSMODs in the target libraries.

APPN network nodes, enabling network nodes throughout the network to select optimal routes for LU-LU sessions based on requested cla
d range of end-user services and supports sessions between its local control point (CP) and the CP in an adjacent network node. It uses these sessions to

d network nodes and their client end nodes. See Advanced Peer-to-Peer Networking .


oad range of end-user services and that can provide the following:
PPN end node.
system change number

ch to more than one area. All area border routers are part of the backbone, so they must either attach directly to a backbone IP subnet or be connected to a

d States Department of Defense Advanced Research Projects Agency (now the Defense Advanced Research Projects Agency).

or remove fields from the basic header. When a protocol on the sending host adds data to the packet header, the process is called data en
n Interchange.

sembler statements that can be assembled to create an object module.
s assembler language instructions into binary machine language (object code).
ng language that comprises instructions for basic computer operations which are structured according to the data formats, storage structures, and registers

jax (programming) Jump .


tions that are done separately from the job in which they were requested; for example, submitting a batch job from an interactive job at a work station. See 
nsfer mode in which the information is organized into cells. It is asynchronous in the sense that the recurrence of cells containing information from an indivi
tomatic teller machine.
nd Durability

ment containing attributes associated with a user. Also the Authorization Certificate, where the associated attributes in the digital documen
an Attribute Scoped Query Jump .
basis for creating flows. The attributes can include the transport protocol name, IP address, application port number, and DS field.
 a data processing system mainly to test the adequacy and effectiveness of procedures for data security and data accuracy.

d Data. See Authenticated encryption Jump .


tion of the identity of a user or process and the construction of a data structure that contains the privileges that were granted to the user or process.
on Packages Jump .
ces, or functions.
he public key for the certificate authority (CA) in AD CS. See AD CS: Authority information access locations should be included in the extens
r either complete or restricted access to an object, resource, or function.
mining whether a user is permitted access to a RACF-protected resource.
R).  A request for correction of a problem caused by a defect in a current unaltered release of a program. The correction is called an APAR fix.
y that permits identification of programs authorized to use restricted functions.
res to replace or simplify actions of operators in both systems and network operations.

age editor to resolve external symbols left undefined after all the primary input has been processed. See automatic call library.

es or object decks that are to be used as secondary input to the linkage editor to resolve external symbols left undefined after all the primary input has been

utomatic call library.
during the current run, that is, without resubmitting the job. An automatic restart can occur within a job step or at the beginning of a job step. Contrast with d
covery function that improves the availability of batch jobs and started tasks. When a job fails, or the system on which it is running unexpectedly fails, z/OS 

e Automatic Virtual Machine Activation Jump .

ms certain operations automatically in response to system events or user preferences.
her than processor storage.
 resource is ready when needed to process data; the percentage of time a system, network, or component can be utilized, within a certain time frame. Gene

omain Services in the Windows Azure cloud. Windows Azure is the Microsof cloud computing platorm, and one of the services available i
Join on Windows 10 devices Jump .
To Business (B2B) and Business To Consumer (B2C). See Azure AD, B2B, B2C, DS, B2x – Straining the Alphabet Soup Jump . Also Binary 2 (to
e Analysis Services? Jump
Pipeline & Recurring Jobs in Azure Data Lake Analytics Made Easy Jump .
zure Disk Encryption Preview for Virtual Machine Scale Sets Jump .
s Azure Information Protection? Jump

Site Recovery: Your DR Site in Microsof Azure Jump .


QL Database and the new Database Throughput Unit Jump .
onnecting links providing the primary data path across a network. (2) In a local area network multiple-bridge ring configuration, a high-speed link to which th
vironment in which low-priority programs are executed. (2) Under TSO/E the environment in which jobs submitted through the SUBMIT command or SYSIN
ee Background Intelligent File Transfer Service (BITS) Overview.
y a batched or non-interactive job. (2) Under TSO, a job entered through the SUBMIT command or through SYSIN. Contrast with foreground job.
esources since the last commit or backout or, for the first unit of recovery, since the beginning of the application. Backout is also called rollback or abort.
eral connectors in parallel to each other, so that each pin of each connector is linked to the same relative pin of all the other connectors, forming a computer
e, or facility that can be used in the event of a malfunction or loss of data. (2) The process of creating a copy of a data set to ensure against accidental loss
s there was one primary domain controller and zero or more backup domain controllers. The concepts no longer apply in Active Directory, w
ackup in the event that the distributing host should malfunction. The backup host takes over the IP address of the distributing host when required. See distr

tions line, normally expressed in bits per second (bps). (2) A measure of the capacity of a communication transport medium (such as a TV cable) to convey

ore. See Bare-metal restore Jump .


g elements of the base z/OS system or other products that were not previously present in the target libraries. Base functions are identified to SMP/E by the
 target system modules, macros, source, and DLIBs created by system generation, to which function and service modifications are applicable.
Baseboard management controller Jump .
nit of data and control information passed between half-sessions. It consists of a request/response header (RH) followed by a request/response unit (RU).
obs brought together for processing or transmission. Pertaining to activity involving little or no user action. Contrast with interactive.
actions submitted to the system to be performed with little or no interaction between the user and the system. Contrast withinteractive job .
m. An IMS™ batch processing program that has access to online databases and message queues. BMPs run online, but like programs in a batch environme
gram or a series of programs in which one or more records (a batch) are processed with little or no action from the user or operator. Contrast with interactiv

ment tool. See Best Practices Analyzer Jump .


omer Technology Preview). Ofen called the beta release in the sofware release life cycle. See Beta. Jump

 data in which the most significant byte is placed first. Big endian is used by most hardware architectures including the z/Architecture™. Contrast with little e
g to a MIME specification. Encodes any binary string (a byte sequence of 8-bit padded ASCII characters) using a 64 character alphabet of pr
ect human reading. Binary data may contain unprintable characters, outside the range of text characters. (2) A type of data consisting of numeric values sto
y data stored as a single entity in a database. See Binary large object Jump .

ions or program modules into a single program module, resolving references between them. (2) A connection between systems or logical units. (3) In SNA,
 output of the language translators and compilers into an executable program (load module or program object). It replaces the linkage editor and batch load
mware interface. See BIOS Jump .

gration service. See BizTalk Services Jump .


r in a DD statement. It specifies that space is allocated by blocks.

 (2) A unit of data storage on a device. (3) A set of contiguous pages in a buffer pool. (4) A string of data elements that is recorded or transmitted as a unit. (
n a block. (2) A measure of the size of a block, usually specified in units such as records, words, computer words, or characters. Synonymous with block len
e operating systems afer encountering a critical system error. Usually, the system must be shut down.
embled collection of physical hardware that is installed in the central processor complex (CPC) cage. This hardware collection consists of processor chips,
t exchanges routing information between autonomous systems. For more information, see RFC 4271 (http://www.iet.org/rfc/rfc4271.txt).
erconnects APPN networks having independent topology databases in order to support LU-LU sessions between these networks. See extended border no
y of a subarea node to provide protocol support for attached peripheral nodes, such as: (a) interconnecting subarea path control and peripheral.

network architecture that appears as a network node to the downstream end nodes in low entry networks and as an end node to the wide area network.

ultiple LANs (locally or remotely) that use the same logical link control protocol, but that can use different medium access control protocols. A bridge forward
wn device Jump .
r Own Encryption (BYOE). See Bring Your Own Encryption Jump .

a to all destinations. (2) Simultaneous transmission of data to more than one destination. (3) Contrast with multicast.
ch request, when the location of a resource is unknown to the requester, to all network nodes in an APPN network. Contrast with directed Locate search.

put or output data temporarily. (2) An area of storage that compensates for the different speeds of data flow or timings of events by temporarily holding a blo
pool without incurring a read from disk or a database query. Ratio of the number of logical reads to the number of physical reads.
ata pages are read, modified, and held during processing.

veral devices located between two end points, with only one device being able to transmit at a given moment.

monitor business activities. See Business activity monitoring Jump .

gence Jump .
o. See Business Intelligence Development Studio Jump .

ee Business Rule Engine Jump . Also the Business Rules Engine, a .NET compliant class library. See Business Rules Engine Jump .

business Jump .

o-employee Jump .

ould otherwise cause SYSMOD processing to fail. This is done by using the BYPASS operand on an SMP/E command.
nnel that interleaves bytes of data.
red in a stream file. Contrast with record data.
velop software applications in compact, efficient code that can be run on different types of computers with minimal change.

ort groups of patchports, which are pairs of fibre adapters or couplers. Cabinets are used to organize long, complex cables between processors and controll

ler and faster than main storage, used to hold a copy of instructions and data obtained from main storage and likely to be needed next by the processor.
that enables high-performance sharing of cached data by multisystem applications in a sysplex. Applications can use a cache structure to implement sever
rdware elements required for either processing or input/output (I/O) capability. See I/O cage.
Dashboard for Skype for Business Server 2015 Jump .
Microsof PPP extension that is used to negotiate a callback session. Solaris PPP 4.0 supports only the client (initial caller) side of this proto

voked by another.

n be handled by a specific resource.

acter in an input data record that specifies a write, space, or skip operation.
lly indicating the end of a command line. (2) In text data, the action that indicates to continue printing at the left margin of the next line. (3) A character that w
on Detection (CSMA/CD). A media access method that monitors another station's transmissions. If the data station detects another signal during transmi
 collision detection.

uage to format a document written in markup language. See Cascading Style Sheets Jump .
inguish between uppercase and lowercase letters.
ith reference to their locations. (2) To enter information about a file or a library into a catalog. (3) The collection of all data set indexes that are used by the c
ented in an index or hierarchy of indexes that provide the means for locating it.
nguage (JCL) statements placed in a library and retrievable by name.

ows checking of the status of terminals, connections, and other CICS entities from a console or from CICS terminal sessions.

at provides a repository for information on network resource locations; it also reduces the number of network searches by providing a focal point for queries 

e term for central processor complex (CPC) .


essing unit Jump .
s with processor.

puter that contains the sequencing and processing facilities for instruction execution, initial program load, and other machine operations.

al collection of hardware that consists of main storage, one or more central processors, timers, and channels.
 computing system from which the central processing unit can directly obtain instructions and data, and to which it can directly return results. (Formerly refe
y organization or company that issues digital certificates. The digital certificates are used to create digital signatures and public-private key

fication Authority. An entity that issues digital certificates. See Certificate authority Jump . Also Conditional Access.
key certificates that have been revoked by a CA. CRLs are stored in the CRL database that is maintained through IKE.

infrastructure (PKI) systems, a message sent from an applicant to a certificate authority (CA) in order to apply for a digital identity certificat

otocol) An authentication protocol that can be used to verify the identity of a caller on a PPP link. CHAP authentication uses the notion of ch

 a channel subsystem that manages a single I/O interface between a channel subsystem and a set of control units. Each channel is an independent unit tha
r more controller channel interfaces electronically.

put/output (I/O) address that uniquely identifies an I/O device to the channel during an I/O operation.

control that attaches storage paths to a host channel.

nterconnection between a channel and its associated control units.
ent of channels in the physical processor.

bchannels that directs the flow of information between I/O devices and main storage, relieves the processor of communication tasks, and performs path ma

ion (transfer of data) between programs on opposite sides of a channel-to-channel adapter (CTCA).

put/output device that is used a program in one system to communicate with a program in another system.
ion between two CHPIDs on the same or different processors, either directly or through a switch. When connecting through a switch, both CHPIDs must be

ter, digit, or other symbol that is used as part of the organization, control, or representation of data. A character is often in the form of a spatial arrangement

check, or a recording of data for restart purposes, is performed. (2) A point at which information about the status of a job and the system can be recorded so
rmation about the status of a job and the system can be recorded so that the job step can be restarted later.
nt data set. A general term for the primary, intermediate, and final writes that update any checkpoint data set.

, connects two or more data terminal equipment (DTEs) and permits the exclusive use of a data circuit between them until the connection is released. Syno
 on another system or process (usually called the server) to provide it with access to data, services, programs, or resources. See client-server, server.
cense Jump .
role that provides authentication, proxy, and limited redirection services. See Client Access server Jump . Also Cloud Application Security.
ion in distributed data processing in which a program at one site sends a request to a program at another site and awaits a response. The requesting progr
rary (DLL) that implements a group policy on the client computer. See Client-side Processing of Group Policy Jump .
Cloud and Datacenter Management System Center Update Rollup Improvements Jump .
on Provider program for hosting partners Jump . Also the Cryptographic Service Provider, a sofware library that implements the Microsof
that are working together as one unit.

access method used in radio communications, particularly in mobile phone standards. See Code division multiple access Jump .
racters and control function meanings to all code points; for example, assignment of characters and meanings to 256 code points for an 8-bit code, assignm
of 256 potential characters.
nt levels (for example, software, service or operational levels) that share resources. Coexistence includes the ability of a system to respond in the following 
rom concurrent transmissions on a channel, causing the transmissions to be unintelligible.
 or run a program. When parameters, arguments, flags, or other operands are associated with a command, the resulting character string is a single comma
parameter on WTO, WTOR, MGCRE, and certain TSO/E commands and REXX execs that allows you to link commands and their associated message resp

ommand identifier. The command prefix distinguishes the command as belonging to an application or subsystem rather than to z/OS.
vailable to applications running under CICS.
of records with fields separated by commas, or some other character. See Comma-separated values Jump . Also Cluster Shared Volume. Se

ources since the last commit or backout or, for the first unit of recovery, since the beginning of the application.
OBOL).  A high-level language, based on English, that is primarily used for business applications.
ory in the WMI schema that stores class definitions that model WMI managed resources. See Common Information Model Jump .
level human readable programming language, defined by the Common Language Infrastructure (CLI). Used by the .NET Framework and pr
en specification developed by Microsof that describes executable code and the runtime environment. Allows multiple high level languages
environment provided by the .NET Framework which runs code and provides services that make the development process easier. See Com

he moniker for objects with a common name in their distinguished names, for example "cn=Jim Smith,ou=West,dc=mydomain,dc=com".

t of the common area that contains data areas that are addressable by all address spaces.

unication control unit whose operations are controlled by one or more programs stored and executed in the unit. It manages the details of line control and th
lecommunication line.

L). A software product for mainframe servers that emulates the IBM 3745 Communication Controller hardware.
supports (a) the development and use of application programs among two or more connected systems or workstations, (b) multiple concurrent connections
. In z/OS Communications Server, a buffer management technology that reduces performance overhead resulting from the movement of large amounts of d

 ability to work with other devices or programs.
ogram sufficiently complete to be compiled correctly.
program into an executable program (an object deck).
cified to control certain aspects of compilation. Compiler options can control the nature of the load module generated by the compiler, the types of printed o
or (CMOS). A technology that combines the electrical properties of n-type semiconductors and p-type semiconductors.
 system; for example, the scheduler or supervisor.

enables interprocess communication and dynamic object creation in programming languages.

way for z/OS components to collect problem data about events.
d its subordinate type 4 nodes that support APPN network node protocols and appear to an attached APPN or LEN node as a single network node.
tocol of PPP that negotiates the use of data compression on the link. Unlike header compression, CCP compresses all the data within packe

ided design Jump .

ctional unit that permits a common transmission medium to serve more data sources than there are channels currently available within the transmission me
t of a previous input/output, arithmetic, or logical operation.
er system or network as defined by the nature, number, and chief characteristics of its functional units.

e Configuration management database Jump .

ICS systems in which each system is dedicated to one of the main elements of the overall workload. See application owning region and terminal owning


association established between functional units for conveying information. (2) TCP/IP, the path between two protocol applications that provides reliable dat

Sofware for managing remote connections to the Internet or to private intranet sites and network. See Connection Manager Administratio

ol, such as UDP, that does not require a connection to be established prior to data transfer.
equiring establishment of a session prior to data transfer.
r device to be attached to other systems or devices without modification. (2) The capability to attach a variety of functional units without modifying them.
ample, a logical volume) that contains the contents of the entire data entity from a single instant in time.
er, reserved for communication between the computer operator or maintenance engineer and the computer.
defined in CNGRPxx, each of whose members can serve as an alternate console in console or hardcopy recovery or as a console to display synchronous m
See SMPCSI.
on for delivering high-bandwidth content that is hosted in Azure or other location. See Content Delivery Network Jump .

puter program to hold control information.

isk in which VSAM stores records and creates distributed free space. Also, in a key-sequenced data set or file, the set of records that an entry in the seque

 contains the subsystem work manager or subsystem resource manager control program.
am specified by the programmer to be a relocatable unit, all elements of which are to be loaded into adjoining main storage locations.

es, a statement that is used to alter the continuous sequential execution of statements; a control statement can be a conditional statement, such as IF, or an
and controls the operation of one or more input/output devices, and synchronizes the operation of such devices with the operation of the system as a whole

he storage control address, used to identify the storage control to the host system.

er (C-NIC). Computer input/output device that combines a host bus adapter (HBA) with a network interface controller (NIC).
a network by a dynamic routing protocol.
wo programs over an LU type 6.2 session that allows them to communicate with each other while processing a transaction.
system that carries on a dialog with a terminal user, alternately accepting input and then responding to the input quickly enough for the user to maintain a t
irtual machine operating system that provides general interactive time sharing, problem solving, and program development capabilities, and operates only u

which can be installed properly only if the other is present. Corequisites are defined by the REQ operand on the ++VER statement.
lectively fix a system problem. Generally, corrective service refers to APAR fixes.

ring data in the format: count field normally followed by a key field followed by the actual data of a record. The count field contains, in addition to other inform
rough the XCF couple data set format utility and, depending on its designated type, is shared by some or all of the z/OS systems in a sysplex. See sysplex 
at provides high-speed caching, list processing, and locking functions in a sysplex.
fiber optic channel that provides the high-speed connectivity required for data sharing between a coupling facility and the central processor complexes dire
s of XCF that transfer data and status between members of a group residing on one or more z/OS systems in the sysplex.
o control points, using LU 6.2 protocols and a mode name of CPSVCMG, on which network services requests and replies are exchanged. Each CP of a giv

 is used during IPL to initialize the link pack pageable area.
eate, read, update and delete Jump .
on List (CRL) is maintained, allowing clients to determine if a certificate has been revoked.
nect controllers to processors with parallel (bus and tag) interfaces. The crossbar contains a number of channel interfaces on its top, which can connect to o

In VTAM, the function in the system services control point (SSCP) that controls initiation and termination of cross-domain sessions.

g a program in a different address space. The invocation is synchronous with respect to the caller.
mponent of z/OS that allows authorized programs to communicate channel-to-channel, peer-to-peer, across a sysplex. XCF supports program communicatio
et of z/OS services that allow multiple instances of an application or subsystem, running on different systems in a sysplex environment, to implement high-p
matic restart management restarts elements on another eligible system in the sysplex.
nes cryptographic transformations between plaintext and ciphertext.
conceal its meaning.
phic development platorm introduced in Windows Server 2008 that implements the United States government's Suite B cryptographic alg
new function order, containing all current PTFs for that function.

CS). An online transaction processing (OLTP) system that provides specialized interfaces to databases, files and terminals in support of business and comm
Customer relationship management Jump .

mbly or part that a customer can replace in its entirety when any of its components fail. See field-replaceable unit.
f attributes. The attributes that serve as the basis for creating flows are derived from the information in a network packet's header. Flows c
data (CKD) device with a fixed number of tracks. (2) On a magnetic disk or in an assembly of disks, the set of all tracks that can be accessed by all the mag
CLs and ACEs Jump .
cess that runs unattended to perform continuous or periodic system-wide functions, such as network control. Some daemons are triggered automatically to

 common label and accessed by a set of related addresses. See volume.
mula and query language for Microsof PowerPivot and SQL Server Analysis Services (SSAS) Tabular models. See Data analysis expressions J
hat is used to manage the bandwidth, relative priority, and flow control of multiple traffic types that share the same network link, for exam

thernet Local Area Networks (LAN's) for use in data centers. See Data Center Bridging (DCB) Overview Jump .
A protocol that enables communication between hosts to exchange configuration information about the data center bridging features.

ol. See Data Center Transmission Control Protocol (DCTCP) Jump .


e attributes, defined by the storage administrator, that are used that are used when allocating a new SMS-managed data set.
ng or receiving data between two points of a network.

onsistency as a Service. See DCaaS: Data Consistency as a Service for Managing Data Uncertainty on the Clouds Jump .
d by access method routines in storing and retrieving data.

ription Language. Syntax for defining data structures, especially database schemas. See Data definition language Jump .
ame of a data definition (DD) statement that corresponds to a data control block that contains the same name. (2) The symbolic representation for a name p
atement that serves as the connection between a file's logical name (the ddname) and the file's physical name (the data set name).

m that describes the files to be used in the program and the records contained within the files. It also describes any WORKING-STORAGE data items, LIN
key 64-bit block data encryption method standardized by ANSI as ANSI X.3.92. DES uses a 56-bit key.
for the encryption of electronic data used by Kerberos. Superceded by the Advanced Encryption Standard (AES). See Data Encryption Stan

ture of an operating system to prevent errors and malware exploits. See Data Execution Prevention Jump .
sed program that is a high-speed data-processing utility. DFSORT provides a method for sorting, merging, and copying operations, as well as providing ver

on system DASD volumes that is being sent to the recovery system for writing to DASD volumes on the recovery system.
n accidental or intentional destruction, alteration, or loss of data does not occur.
by nodes on a data link (such as an SDLC link or a token ring) to accomplish an orderly exchange of information.
nnection reference model, the layer that provides services to transfer data between entities in the network layer over a communication link. The data link lay
nsporting network protocols that use IEEE 802.2 logical link control (LLC) type 2. SNA and NetBIOS are examples of protocols that use LLC type 2. See en
ntion Jump .
d for selecting, inserting, deleting and updating data in a database. See Data manipulation language Jump .
ction Manager Jump .
mmunications device that is used on a leased-line PPP link. DSU converts between data-framing formats that are used on telecommunicatio

ed data records that is stored and retrieved by an assigned name. Equivalent to a file in other operating systems.
he loss of individual data sets.
that describes the attributes of a data set and is normally stored on the same volume as the data set. (2) A general term for data set control blocks and tape
stems (such as DB2® or IMS DB) or application programs to directly access and change the same data, while maintaining data integrity.
 like shared memory regions in POSIX. A data space contains data only, which can be shared by multiple address spaces (users) without inadvertently bein
 elements being transmitted, or intended for transmission, in character or binary-digit form, using a defined format. (2) All information (data and control com
entation that characterize data.
cal business information to an organization. The data warehouse system cleanses the data for accuracy and currency, and then presents the data to decisi
base Jump .
endent data items that are stored together to serve one or more applications.

Service (DaaS) Solution Jump . Also Diagnostics as a Service. See DaaS – Diagnostics as a Service for Azure Web Sites Jump . Also Desktop a
blity feature of Exchange server. See Database availability groups Jump .
Transact-SQL commands to check the physical and logical consistency of a Microsof SQL Server database. See DBCC (Transact-SQL) Jump

ed packet, independent of other packets, which carries information sufficient for routing from the originating data terminal equipment (DTE) to the destinatio
atagram Transport Layer Security protocol Jump .
e of link aggregation that provides high availability for the clients configured over the aggregation across multiple switches without requirin
 or more concurrent DB2 subsystems that directly access and change the same data while maintaining data integrity.

essing cannot continue because each of two elements of the process is waiting for an action by or a response from the other. (2) Unresolvable contention f
gned to a specific task.

mponent of DB2 that generates SQL table declarations and COBOL, C, or PL/I data structure declarations that conform to the table. The declarations are g
system resource--a device, a program, or a whole system--to an application or purpose.
is taken when no alternative is explicitly specified by the user.

system when a user resubmits a job. The operator submits the restart deck to the system through a system input reader. See checkpoint restart. Contrast w
was removed from the system when another function was installed. This is indicated by the DELBY subentry in the SYSMOD entry for the deleted function.
that is set up to prevent public access to an organization's private network. The isolated network can contain resources that a company offe

Denial-of-service attack Jump .

 end node or network node that: (a) owns dependent LUs in its local node or in adjacently attached nodes; and (b) obtains SSCP services for these depend
work node that provides SSCP services for dependent LUs owned by dependent LU requesters (DLURs) located elsewhere in an APPN network.
ncoding Jump .
me and one of the following: a user ID, a remote printer or punch, a special local printer, or LOCAL (the default if only a node name is specified). (2) Any poin
pplication services to an authorized external user.

ble network bandwidth and the connection latency or round-trip time.


at appears to the application as such.
vice-level frame that selects a specific device on a control unit image. The one or two left-most digits are the address of the channel to which the device is a
controls the reading, writing, or displaying of data at one or more I/O devices or terminals.
er identifier, for example 13A0, that you associate with a device to facilitate communication between the program and the host operator. The device number
F).  A program used to initialize DASD volumes at installation and perform media maintenance.
device; for example, 3390.

ng up and recovering data, and managing space on volumes in the storage hierarchy.

vice that provides centralized control of Internet Protocol (IP) addresses. DHCP servers assign dynamic IP addresses and TCP/IP settings to
t is used to identify the client system in a DHCPv6 enabled system.

ensions. See DHTMLX Jump .


et. Toolset to troubleshoot and repair Windows desktops. See Diagnostics and Recovery Toolset Jump .
ng options that allow you to browse or modify information, take specific action relating to selected objects, or access other dialogs. For example, HCM prov
LTSB, CB, CBB for Windows 10.
ce between LTSB, CB, CBB for Windows 10.
securely exchanging cryptographic keys over a public channel. See Diffie–Hellman key exchange Jump .
sed to identify an individual, server, company, or some other entity, and to associate a public key with the entity. A digital certificate is issued by a certificatio

rithm named after E.W. Dijkstra that finds the shortest path from a source to a destination.
vice in which the access time is effectively independent of the location of the data.

n perform data transfers that involve main memory and other devices without the help of the CPU. This type of data transfer is known as di
hardware subsystems to access system memory independently of the central processing unit (CPU). See Direct memory access Jump .

facility that allows a device to get direct access to the system or bus memory without the intervention of the system processor.
the Integrated Load Balancer to balance the incoming requests to the back-end servers but lets return traffic from the servers to the client

ent to a specific destination node known to contain a resource, such as a logical unit, to verify the continued presence of the resource at the destination nod
mes and controlling information for other files or other directories. Directories can also contain subdirectories, which can contain subdirectories of their own. 
Domain Controller is referred to as the DIT. The file name is ntds.dit

instance of Active Directory on that computer offline, possibly for maintenance or troubleshooting. Requires a DSRM password.
a processing unit that prevents the occurrence of certain types of interruptions.
 such as a fire, that destroys or otherwise disables a system. Disaster recovery techniques typically involve restoring data to a second (recovery) system, th

ore flat, circular plates with magnetic or optical surfaces on which information is stored.

 specific device for a job that is ready to run. (2) In CICS, to schedule a task for execution. Dispatching is done by CICS task control. See service request

asks, used to determine the order in which they are to use the processor in a multitasking environment such as z/OS.
hose input/output function you can control.
hod of using ordinary strings to represent shared information. DN is used in technologies such as LDAP and X.509 certificates.

icrosof technology for communication among sofware components distributed across networked computers. Extends COM. See Distribut

lves the cooperation of two or more machines communicating over a network. Data and resources are shared among the individual computers.

E).  A comprehensive, integrated set of services that supports the development, use, and maintenance of distributed applications. DCE is independent of the
MS other than the local system.
egistration of its domain resources to a central directory server
ponent. DFS joins the local file systems of several file server machines making the files equally available to all DFS client machines. DFS allows users to ac
services that allow servers to organize distributed file shares into a distributed file system. See Distributed File System (Microsof) Jump .
istributed File System Replication Jump .

oint of entry) for a sysplex. The distributing host is the normal owner of the IP address that clients out in the network use to connect to the sysplex.
tains the master copy of all the elements in a system. A distribution library can be used to create or back up a target library.
rds in a CSI data set that describes the SYSMODs and elements in a distribution library.

or subnetwork exposed to an untrusted network, such as the Internet, requiring special protection. See DMZ (computing) Jump .

work resources under control of a particular system services control point (SSCP). (2) A part of a network that is administered as a unit with a common proto
oniker for Domain Component, as used in distinguished names (for example "dc=mydomain,dc=com").
r supported as domain controllers in the domain, and the features of Active directory that are available.
 protocols, a server program that supplies name-to-address translation by mapping domain names to IP addresses. Synonymous with name server.
vides the naming policy and mechanisms for mapping domain and machine names to addresses outside of the enterprise, such as those on
esolves computer names into IP addresses. See Domain Name System Jump .

data formats, network traffic exchange types, and conventions for naming security-relevant information. Security policies, cryptographic alg

operating systems before Windows 95. See DOS Jump . Also Denial of Service attack. See Denial-of-service attack Jump .

ncoding in which all characters are encoded in two bytes. See DBCS Jump .

 characters in which each character is represented by a two-bytes code. Languages such as Japanese, Chinese, and Korean, which contain more symbols
s that comprises eight bytes (two 4-byte words) and is referenced as a unit.
ications to run on previous releases of z/OS.
nt work before stopping the device.
e program. Contrast with target system.
ed in the Differentiated Service (DS) field of a packet header. DSCP indicates how a packet must be forwarded. For more information, see R

s Jump . Also Directory System Agent. See Directory System Agent Jump .

DCB and DD and in a data class definition).

orage. Dumps are typically produced following program failures, for use as diagnostic aids. (2) To copy the contents of all or part of storage for the purpose 
 data can be sent and received at the same time. Synonymous with full-duplex. Contrast with half-duplex.
overnance across file servers to control who can access information and to audit who has accessed information. See Dynamic Access Contro
esources to a program at the time the program is executed rather than at the time it is loaded into central storage.

a Masking Jump .
mic DNS. See Dynamic DNS Jump .
protocol that enables automatic network configuration of hosts in a TCP/IP network by using a client-server mechanism. This protocol enab
he four phases in typical DHCP operations. See Dynamic Host Configuration Protocol Jump .

e Dynamic HTML Jump .


Language Runtime Overview Jump .
executable code and data bound to a program at load time or run time. The code and data in a dynamic link library can be shared by several applications s
ystem feature that is used to reconfigure system hardware while the system is running. By using DR, hardware resources can be added or re
e changes to the channel subsystem and to the operating system while the system is running.

djusts automatically to network topology or traffic changes.

s the system to move IP addresses in event of an application, TCP/IP stack, or LPAR failure.
rk that requires a separate server to support the exchange of the keys that are used to encrypt data at each end point.
stem coupling facility hat can be automatically generated any time TCP/IP becomes active within a sysplex.
brary Jump .

erchange Code.

ver an electronic medium such as the Internet. (2) The transformation of key business processes through the use of Internet technologies.

that enables hosts to exchange virtual link information with an external switch. EVB offloads the enforcement of traffic SLAs to the switch.

switch in Oracle Solaris that provides the ability to span multiple servers, thus providing network connectivity between the virtual machine

s a macro, module, dialog panel, or sample code.
efined representation of the devices that are eligible for allocation. The EDT defines the esoteric and generic relationship of these devices. During IPL, the 

per-protocol, and per-address basis.


nsion header that provides integrity, confidentiality, and replay protection to IP datagrams.

ue used by layered protocols by which a layer adds control information to the protocol data unit (PDU) from the layer it supports. In this respect, the layer e
dispatchable units (SRBs and tasks) in one or more address spaces and is reported on and managed as a unit.
at it cannot be read without knowing the coding key.
orking (APPN) end node.
at reflects how certain multi-octet data is stored in memory. See big endian, little endian .
feature that allocates bandwidth on a NIC to the applications based on the DCB priority.

entities, functions, and resources that form the total business concern.
NA data over an IP network. Enterprise Extender is an extension of SNA High Performance Routing that provides encapsulation of SNA application traffic w

A set of products and services that provides a dynamically connected environment using optical cables as a transmission medium.

een where operators can enter commands or command responses.
ammer-specified name within a control section that identifies an entry point and can be referred to by any control section. See entry point.
nstruction that is executed when a routine is entered for execution. Within a load module, the location to which control is passed when the load module is in
at represents an entry point. See entry point.

mplementations, a temporary port number assigned to a process for the duration of a call. Ephemeral port numbers are typically assigned to client processe
ue for routing packets along multiple paths of equal cost. The forwarding engine identifies paths by next-hop. When forwarding a packet, th

CON protocols.
N optical channels that provides connectivity capability and control for the attachment of any two links to each other. See ESCON Manager.
m that provides host control and intersystem communication capability for ESCON Director connectivity operations. See ESCON Director.
mainframe computing, a function that enables logical partitions (LPARs) to share an ESCON channel path by providing each LPAR with its own channel-sub
rouping of I/O devices of usually the same device group. Eligible device tables (EDTs) define the esoteric and generic relationship of these devices. The na

ogy for local area networks (LANs) that allows multiple access and handles contention by using Carrier Sense Multiple Access with Collision Detection (CS

ge capacities and channel volume: 1 152 921 504 606 846 976 bytes or 2(60).
ror or that requires special processing before it can be installed. ++HOLD and ++RELEASE statements identify exception SYSMODs.

 which has yet to be loaded into memory for execution.
m suitable for execution by a computer. The program can be an application or a shell script. (2) A program that has been link-edited and can therefore be run
re transmission groups that connect two subarea nodes. An explicit route is identified by an origin subarea address, a destination subarea address, an expl
nge Code (EBCDIC).  An encoding scheme that is used to represent character data in the z/OS environment. Contrast with ASCII and Unicode.
e that interconnects: (a) APPN networks having different network identifiers; or (b) separate partitions of the same APPN network, where the partitioning is 
other than an MCS console from which operators or programs can issue system commands and receive messages. An extended MCS console is defined t
and software-based remote copy service option that provides an asynchronous volume copy across storage subsystems for disaster recovery, device migra
onic marker or identifier that serves as an identification and address for a computer or network device to connect and access the Internet.
ormatting Object
nsformation
is created for applications that are external to reactive network configuration but can change and modify a network configuration. ENMs p

rence to a symbol, such as an entry point name, defined in another program or module.
erm for Sysplex Timer® .

hes to a redundant or standby system when services fail. (2) A cluster event where the primary database server or application server switches over to a bac
me required for detecting whether an interface or path from an interface to an Internet layer device no longer works.

multiple branches.

vides a data rate of 100 Mbps.
n identifier for each service, hardware resource, or sofware package in Oracle Solaris. For packages, the FMRI includes the package publish

ed with the product or can be ordered separately.
o process hardware and software orders.
thods for developing sofware.

An optical fiber communication method offering channels with high data rate, high bandwidth, increased distance and a large number of devices per contro
can National Standards Institute (ANSI) standard for a 100-Mbps LAN using fiber optic cables.
s and transmission media between optical fiber transmitters and receivers. A fiber link can comprise one or more fiber cables and patchports in fiber manag
n a structure built to meet optic, mechanical, and environmental specifications.
dard that transports encapsulated Fibre Channel frames over Enhanced Ethernet. FCoE enables network convergence and cost-effective sto

channel communication protocol designed for IBM mainframe computers and peripherals.

hat is replaced in its entirety when any one of its components fails. See customer-replaceable unit.

and retrieved by an assigned name. A file can include information that starts a program (program-file object), contains text or graphics (data-file object), or p
pplication protocol used for transferring files to and from host computers.
both hardware and software, that prevents unauthorized traffic into and out of a secure network. (2) An intermediate server that functions to isolate a secure
ump. A dump produced by First Failure Support Technology, a licensed program that captures information about a potential problem when it occurs.
 in which the next item to be retrieved is the oldest item in the queue.
lly a temporary correction or bypass of defective code.
me length as all other records with which it is logically or physically associated. Contrast with variable-length record.
nction that can quickly copy data from a source location to a target location.

e that is occupied by a computer program. For example, if a program occupies a large amount of storage, it has a large footprint. (2) Amount of floor space
vironment in which high-priority programs are executed. (2) Under TSO, the environment in which programs are swapped in and out of central storage to all
y a real-time job. (2) Under TSO, any job executing in a swapped region of central storage, such as a command processor or a terminal user's program. Co
dependent table of a constraint relationship. The key must have the same number of columns, with the same descriptions, as the primary key of the parent t
ing is similar to creating an address space and attaching. It creates a copy of the parent process, including open file descriptors.
In SNA, a field in each transmission header (TH) that indicates the format of the TH; that is, the presence or absence of certain fields. TH formats differ in a
for applications involving numeric computations. In previous usage, the name of the language was written in all capital letters, that is, FORTRAN.
ating in the host.
etween two different networks or subnetworks.
overs, and all electrical parts mounted there that are packaged as one entity for shipping. For a mainframe microprocessor cluster, a frame contains one or 
ough the network based on the address field (data link connection identifier) in the frame and for managing the route or virtual connection.

tion in which the contents of an entire terminal screen can be displayed at once. Full-screen mode is often used for fill-in-the-blanks prompting.

at comprises four bytes (one word) and is referenced as a unit.
e address is evenly divisible by 4.
tem component or licensed program) that can be installed in a user's system if desired. Functions are identified to SMP/E by the ++FUNCTION statement. 

 code that identifies the release levels of a z/OS licensed program.

ct networks or systems with different network architectures. The systems may have different characteristics, such as different communication protocols, diffe
tween networks.

A protocol that is used by a client system to automatically register VLAN IDs with attached switches.
nvironment, a service program that records significant system events, such as supervisor calls and start I/O operations, for the purpose of problem determi
of historically related non-VSAM data sets that are arranged in chronological order; each data set is called a generation data set.
with similar characteristics. For example: the device types 3270-X, 3277-2, 3278-2, -2A, -3, -4, and 3279-2a, -2b, -2c, -3a, -3b belong to the same generic. E
3 framework is a function calls-based interface of MAC plugins and MAC driver service routines and structures. The GLDv3 framework imple

™ (GDPS®).  An application that integrates Parallel Sysplex technology and remote copy technology to enhance application availability and improve disaste

ted with Windows PowerShell Desired State Configuration Jump .


the CRUX of DNVM, DNU and DNX in ASP.NET 5 Jump .
protocol that is capable of transmitting data at one billion bits per second.
bytes when referring to memory capacity; in all other cases, it is defined as 1 000 000 000 bytes.
an installation to establish an in-storage table of default values for authorization levels for selected resources.

on that provides a serialization mechanism for resources (typically data sets) across multiple z/OS systems.
e or more z/OS systems that use global resource serialization to serialize access to shared resources (such as data sets on shared DASD volumes).

 set used to record information about SYSMODs received for a particular system. The global zone also contains information that (1) enables SMP/E to acce

ce Friday, 15 October 1582 throughout most of the world.
hare access authorities for protected resources.

z/OS, running in a virtual machine managed by the z/VM® Control Program (CP).

ng to transmission in only one direction at a time. Contrast with duplex.
), the initial setup of a TLS connection.
le support or a graphic console, a permanent record of system activity.
o the computer program or method of use; for example, mechanical, magnetic, electrical, or electronic devices. Contrast with software .
An interactive interface in z/OS that is used to define hardware configurations to the operating system and the channel subsystem.

A console used to monitor and control hardware such as the IBM System z9™ processors.
net, thus protecting it from external intrusions. A firewall can include packet filtering, proxy servers, and NAT.
element, channel path, device, and so on.
e) A keyed hashing method for message authentication. HMAC is a secret key authentication algorithm that is used with an iterative crypto
tring. It contains the string interfaces which connect to controller device interfaces.

ne or more components are mounted to absorb, carry away, or radiate the heat generated by the components. Overheating can result in the malfunction or 
Hexadecimal digits range from 0 through 9 (decimal 0 to 9) and uppercase or lowercase A through F (decimal 10 to 15) and A through F, giving values of 0 t

ata set that contains a POSIX-compliant hierarchical file system, which is a collection of files and directories organized in a hierarchical structure, that can b

anguage above the level of assembler language and below that of program generators and query languages. Examples are C, C++, COBOL, Fortran, and P
perating in parallel, each of which can have multiple processors. See n-way.
igh-speed TCP/IP connectivity within a central processor complex. It eliminates the need for any physical cabling or external networking connection betwee

ed to indicate that certain SYSMODs contain errors or require special processing before they can be installed. ++HOLD and ++RELEASE statements are u
 intermediate nodes. It consists of only a single transmission group connecting adjacent nodes.
rk and provides an access point to that network. The host can be a client, a server, or both a client and server simultaneously.

thout turning off the system.
ble of being replaced while the system is on.
SP). A computer program that provides supplementary job management, data management, and task management functions, such as: control of job flow, o

uter that uses the Hypertext Transfer Protocol (HTTP) to serve objects by responding to requests from other programs, such as browsers.
e either connected or switched. For example, in a star network, the hub is the central node; in a star/ring network, it is the location of wiring concentrators.

me where connections to the central processor complex are made.
hannel path for a logically partitioned processor configuration.
ve, and so on. Devices are logically grouped inside units, which are in turn grouped into strings. The first unit, known as the head of string, contains string in

am that provides access control by identifying users to the system; verifying users of the system; authorizing access to protected resources; logging detecte
esponsible for software service.
 representative who performs maintenance services for IBM software in the field.

cess method services commands. It can be invoked as a job or jobstep, from a TSO terminal, or from within a user's application program.
or a server and a client to identify, group, and manage a set of related IPv6 addresses.

er that is used to identify the interface on the client system in a DHCPv6 enabled system.
tabase Manager.
one or more concurrent IMS DB subsystems that directly access and change the same data while maintaining data integrity.

es: red, yellow, and green. You define the outcomes in the IPQoS configuration file.
ubnet except the sender. Broadcast packets are usually not routed beyond the subnet.

Any of several system environments available with a database manager and transaction processing that are capable of managing complex databases and t

procedure that causes the z/OS operating system to begin operation. During IPL, system programs are loaded into storage and z/OS is made ready to perfo
ntral and expanded storage to be assigned to a logical partition.
t reads and processes operation control language statements from the system input device.
tion that selects jobs and job steps to be executed, allocates input/output devices for them, places them under task control, and at completion of the job, su
s, channel, or communication path involved in data input, data output, or both.
DS).  A file that contains different configuration definitions for the selected processor. Only one IOCDS is used at a time. The IOCDS contains I/O configuratio
M linear data set that contains I/O definition information, including processor I/O definitions and operating system I/O definitions, including all logical objects

target libraries or to accept a SYSMOD into the distribution libraries.
M software product may be modified by a customer's system programmers to change or extend the functions of the product.

ole screen that contains messages about console control and input errors.
mote peer. Both the PPP and UUCP protocols use chat scripts for establishing dial-up links and dial-back calling.

). An international communications standard for sending voice, video, and data over digital telephone lines.
inal adaptor) A signal-adapting device that provides a modem-like interface for a dial-up PPP link over an ISDN. Solaris PPP 4.0 configuratio

m that alternately accepts input and responds. In an interactive system, a constant dialog exists between user and system. Contrast with batch.
. A component of z/OS that permits online problem management, interactive problem diagnosis, online debugging for dumps, problem tracking, and problem
PF).  A dialog manager for interactive applications. It provides control and services to permit execution of dialogs.

oth an APPN network node and a type 5 subarea node to transform APPN protocols to subarea protocols and vice versa. (2) Contrast with migration data ho
nected networks that use the Internet suite of protocols and permit public access.
n organization that delegates registered IP addresses to the Internet registries around the world. For more information, see https://www.ia

hat is used by a network client to obtain an IP address from a server.

otocol that is used to detect and report errors in a network. For more information, see RFC 792 (https://tools.iet.org/html/rfc792) and RFC

). An Internet protocol that is used by a gateway to communicate with a source host, for example, to report an error in a datagram.

e provision of authenticated keying material for IPsec security associations (SAs). Fore more information, see RFC 2409 (https://www.rfc-ed

 data through a network or interconnected networks. Internet Protocol (IP) acts as an intermediary between the higher protocol layers and the physical netw
bprotocol of PPP that negotiates the IP addresses of the peers on the link. IPCP also negotiates header compression for the link and enables

the internet protocol that supports a 32-bit address space. IPv4 is sometimes referred to simply as IP. For more information, see RFC 791 (

the internet protocol that supports a 128-bit address space. For more information, see RFC 2460 (http://www.iet.org/rfc/rfc2460.txt).

registration information of Internet numbers that include IP addresses and autonomous system (AS) numbers.

anagement Protocol) A common framework for establishing the format of SA attributes, and for negotiating, modifying, and deleting SAs. IS

s the execution of a computer program, caused by an event external to that process, and performed in such a way that the process can be resumed.
ernet standards and applications (such as Web browsers) with an organization's existing computer networking infrastructure.
ge. An XML based markup language used in SharePoint. See Introduction to Collaborative Application Markup Language (CAML) Jump .
o Data Quality Services Jump .
etects attempts or successful attacks on monitored resources that are part of a network or host system.

 IP version 6, the 128-bit address) that specifies the location of each device or workstation in the Internet. For example, 9.67.97.103 is an IP address. The a

y that ensures that a system has continuous access to the network. With IPMP, you configure multiple IP interfaces into an IPMP group.
tworks that are connected through the Internet Protocol.
that provides an implementation of the diffserv model standard, plus flow accounting and 802.1D marking for virtual LANs. By using IPQoS

addressable points in a network.
t provides protection for IP communications by authenticating and encrypting IP packets.

rnet Engineering Task Force (IETF) standards that define an architecture at the Internet Protocol (IP) layer to protect IP traffic by using various security serv

cility/Program Development Facility.

o the system, converts them to internal format, selects them for execution, processes their output, and purges them from the system. In an installation with 
o the system, converts them to internal format, selects them for execution, processes their output, and purges them from the system. In complexes that hav
bs are defined by JCL statements.
ies that can be defined. With the classification of jobs and direction of initiator/terminators to initiate specific classes of jobs, it is possible to control the mixtu
ommands used to identify a job to an operating system and to describe a job's requirements.
atements placed into an input stream to define work to be done, methods to be used, and the resources needed.
for spooling, job queueing, and managing I/O.
used as a measure of the job's relative importance while the job contends with other jobs for system resources.
d output that delimit jobs.
at request and control execution of a program and that specify the resources needed to run the program. The JCL statements for a job step include one EXE

ear in positions 1 and 2, and the day in positions 3 through 5. The day is represented as 1 through 366, right-adjusted, with zeros in the unused high-order p
onnections between patchports.

performs basic functions such as allocating hardware resources.

ains public keys, private keys, trusted roots, and certificates.

e or data set whose records are loaded in ascending key sequence and controlled by an index. Records are retrieved and stored by keyed access or by ad
consists of a specific character string (such as DSNAME=).

xample, a bus or ring) that can operate independently, but that is connected to other parts of the network by means of bridges. (2) A ring or bus network wit
Language Environment. A set of architectural constructs and interfaces that provides a common runtime environment and runtime services for C, C++, CO

merges successive incoming packets into a single packet before the packets are delivered to the IP layer. The incoming packets must share t

in which the next item to be retrieved is the item most recently placed in the queue.

ains a related collection of named members. See partitioned data set.

 IBM does not sell as part of a machine, but licenses to the customer. LIC is implemented in a part of storage that is not addressable by user programs. So
can be ordered from the program libraries, such as IBM Software Distribution (ISMD). IMS and CICS are examples of licensed programs.

client-server protocol that is used to manage directory information over an IP network. LDAP enables a single point of management for sto

DAP). An Internet protocol standard, based on the TCP/IP protocol, which allows the access and manipulation of data organized in a Directory Information T
medium and data link control component that together transmit data between adjacent nodes.
EE 802.3ad standard for dynamically exchanging network configuration information among systems in a link aggregation group. This protoc

PP that is used to negotiate the initial set of link parameters between the peers. LCP checks the identity of the linked device, searches for e

r protocol that enables network devices to advertise their capabilities, identity, and current status to other network devices on an IEEE 802

object modules.
ge that contains reenterable routines that are loaded at IPL (initial program load) time and can be used concurrently by all tasks in the system.
 information about the usable interfaces and reachable neighbors of a router or network. The protocol's topological database is formed from the collected lin
n an APPN or a subarea node that represents the connection to another APPN or subarea node that is attached by an APPN or a subarea link. In the resou
ent that resolves cross-references between separately compiled or assembled modules and then assigns final addresses to create a single relocatable load
ay be dispersed but in which each data element contains information for locating the next. Synonymous with chained list.
ram by means of a linkage editor or binder.
t enables multisystem applications in a sysplex to share information organized as a set of lists or queues. A list structure consists of a set of lists and an opt
ata in which the least significant byte is placed first. Little endian is used by the Intel® hardware architectures. Contrast with big endian.

ment of the workload on servers. If one server exceeds its workload, requests are forwarded to another server with more capacity.
in a partitioned data set program library. See program object.

nnects several devices in a limited area (such as a single building or campus) and that can be connected to a larger network.
one or more segments associated with each virtual storage region that contain job-related system control blocks.
APPN or LEN node containing an entry for each transmission group (TG) having at least one end node for an endpoint. In an end node, the database has o
ervices in a node uses to find a resource that is not in that node. The Locate search enables directory services to ask the directory services components in o
at enables applications in a sysplex to implement customized locking protocols for serialization of application-defined resources. The lock structure support

el subsystem structure that provides channel path and subchannel controls for configuring from one to four channel subsystem images. Each channel subs
nit (CU) with or without attached devices, or a group of one or more CUs that share devices. In a channel subsystem (CSS), an LCU represents a set of CU
 system that contains resources (processors, memory, and input/output devices). A logical partition operates as an independent system. If hardware require
ng system that enables the creation of logical partitions.
storage controller that allow one or more host I/O interfaces to access a set of devices. The controller aggregates the devices according to the addressing 
hich a user or application program accesses the SNA network to communicate with another user or application program. An LU can support at least two ses

pe that supports general communication between programs in a cooperative processing environment.

al processor complex (CPC) power-on reset mode that enables use of the PR/SM™ feature and allows an operator to allocate CPC hardware resources (in
s a terminal session. (2) In VTAM, a request that a terminal be disconnected from a VTAM application program.
ins a terminal session. (2) In VTAM, a request that a terminal be connected to a VTAM application program.
roup of instructions execute repeatedly.
t requires a low degree of interaction and cooperation between multiple z/OS images to process a workload. See tightly coupled.
that provides a range of end-user services, attaches directly to other nodes using peer protocols, and derives network services implicitly from an adjacent A

 two logical units (LUs) in an SNA network that typically provides communication between two users.
ect anything else; W - WON'T have this time but WOULD like in the future.

address required for every port or device that connects to a local-area network (LAN). Other devices in the network use these addresses to locate specific 
n that occurs as a result of an equipment malfunction or error.
hine can acquire or interpret (read) from a storage device, a data medium, or other source.
at is to be replaced by a defined sequence of instructions in the same source language.

g, the main program in a multitasking environment.
er center, with extensive capabilities and resources to which other computers may be connected so that they can share facilities.
t can be activated and deactivated as a group. See minor node.

nsive data set and volume information that VSAM requires to locate data sets, to allocate and deallocate storage space, to verify the authorization of a progr
g I/O definitions for several systems or even for a complete enterprise structure. Master IODFs help to maintain consistent I/O data and can provide compre
ty of the master scheduler, used in servicing the message processing portions of z/OS.
the largest data unit, given in octets, that can be transmitted over a link.

ation control statement (in SMP/E).
/OS that is locally attached to a z/OS system and is used to enter commands and receive messages.
sublayer of the data link control layer that supports media-dependent functions and uses the services of the physical layer to provide services to the logical 
e address that is assigned to a network interface. The MAC address is used for communication on the physical network segment.
,048,576 bytes.
PDS) or partitioned data set extended (PDSE).

y used to control message retention, suppression, and presentation.
are waiting to be processed or waiting to be sent to a terminal.
ing of the actual information that is routed to a user at a terminal or to a program.

ork formed by the interconnection of two or more networks which may operate at higher speed than those networks, may cross administrative boundaries, 
ilable to users, that perform certain functions.
n one or a small number of chips.
ement. Tool to manage Group Policy Objects (GPO). Part of the Microsof Desktop Optimization Pack (MDOP) for Sofware Assurance. See O
Microsof App-V Jump .
oint feature. Formerly called Business Data Catalog. See Microsof Business Connectivity Services (BCS) in SharePoint 2010 Jump .
sof Case Studies Jump .
authentication protocol for PPP. Solaris PPP 4.0 supports versions 1 and 2 of this protocol in both client and server mode.

n Coordinator
rosof SQL Server Jump and SQL Server Database Engine Jump .

ed by the system programmer, that relate to the installation of a new version or release of a program to replace an earlier level. Completion of these activitie
h an APPN end node and a type 5 subarea node. Contrast with interchange node.

ource within a major node.
on complex in which one or more of the systems in the global resource serialization complex are not part of a multisystem sysplex.

ce that converts digital data from a computer to an analog signal that can be transmitted on a telecommunication line, and converts the analog signal receiv
 SMP/E control statement used to package a SYSMOD. MCSs describe the elements of a program and the relationships that program has with other progr
rary fixes that have been issued since the previous modification level. A change in modification level does not add new functions or change the programmin
g source code. A module cannot be run. To be run, a module must be bound into a program.
e Measurement Facility (RMF™).
m that uses a sysplex couple data set.

systems sharing the JES2 input, job and output queues (through a checkpoint data set or coupling facility).
to a selected group of destinations. (2) A special form of broadcast in which copies of a packet are delivered to only a subset of all possible destinations. (3
ator interface in a z/OS system.
allows multiple logical partitions to share ESCON channels (and FICON channels) and optionally to share any of the control units and associated I/O device
orm of the z/OS operating system. In current usage, the term MVS refers to those services and functions of z/OS other than z/OS UNIX system services, s
 operate with a number of I/O devices simultaneously. Several I/O devices can transfer records at the same time by interleaving items of data.
n of two or more computer programs or sequences of instructions. See parallel processing.
ysically partitioned to form two operating processor complexes.
gram that has various functions distributed across z/OS images in a multisystem environment.
sole support for more than one system in a sysplex. Multisystem console support allows consoles on different systems in the sysplex to communicate with e
in which two or more z/OS images reside in one or more processors, and programs on one image can communicate with programs on the other images.
 or more z/OS images are allowed to be initialized as part of the sysplex.
s for the concurrent, or interleaved, execution of two or more tasks, or threads. Synonymous with multithreading.
h fiber jumper cables between patchports in a cabinet or between cabinets and active objects such as CHPIDs, switches, converters and controllers with E

 Systems Architecture.
s, synonym for domain name server .
a common measurement of read or write access time to random access memory (RAM).

ation in which two or more locations are physically connected for the purpose of exchanging data.
nit (LU), physical unit (PU), control point (CP), or system services control point (SSCP). It is the origin or the destination of information transmitted by the pa
tion of an IP address used within one network to a different IP address known within another network. Used to limit the number of global

ges the use and maintenance of a network.

es that manage the system's network configuration in Oracle Solaris. Only one NCP can be active on a system at a time.

l configuration object that contains all the properties that defines an NCP. Each NCU represents a physical link or an interface and contains

ocol converter used with SDLC links. By converting protocols, which manage the way data is sent and received, the IBM 3710 Network Controller allows the
col that is used to remotely access shared files across a network. Oracle Solaris supports NFSv2, NFSv3, NFSv4, and NFSv4.1 versions. For m
that allows remote access to z/OS host processor data from workstations, personal computers, or any other system on a TCP/IP network that is using clien

th specific skills and tools for supporting the physical network.
address that defines a network. (2) A 1- to 8-byte customer-selected name or an 8-byte IBM-registered name that uniquely identifies a specific subnetwork.
ed network database containing key information about the systems and the users on the network.

er card that connects a computer to a network. Some NICs can have multiple physical interfaces, such as the igb card.
uit board that plugs into a personal computer, server, or workstation. It controls the exchange of data over a network and provides the electronic functions fo
 provides for the passing of selected jobs, system output data, operator commands, and messages between communicating job entry subsystems connect
tion (OSI) architecture, the layer that is responsible for routing, switching, and link-layer access across the OSI environment.
o-Peer Networking (APPN) network node .
de that provides network services for its local LUs and client end nodes.
 the operation of all or part of a network. (2) In a multiple-domain network, a person or program responsible for controlling all domains. (3) A VTAM applicat

ol from the network layer of the Open Systems Interconnect (OSI) network architecture, such as the Internet Protocol (IP).

s used to set and maintain the system time. The NTP sofware is implemented as the ntpd daemon, which is a complete implementation o

ation of the current connectivity between the network nodes within an APPN network. It includes: (a) entries for all network nodes and the transmission grou
ction to be executed in the absence of any branch or transfer of control.

of the nonpageable dynamic area that is allocated to a job step or system task that is not to be paged during execution. In a nonpageable region, each virtu
be shared by multiple users.
orm to American National Standard or IBM System/370™ standard label conventions.

he Windows NT Backup Utility (NTBackup) in Windows NT and above. The files have the .bkf extension. See NTBackup Jump .
at always remains in central storage.
tage of z/OS that initializes the control program; it allows the operator to request last minute changes to certain options specified during initialization.

example, a 6-way CPC contains six CPs.

 a language translator (such as a compiler or an assembler) and used as input to the linkage editor or binder. An object deck is in relocatable format with m
without linkage editor control statements

while returning to the source. Commonly seen in the Layer-3

t under control of the processor.
n arbitrary starting point in a record, area, or control block, to some other point.
z/OS capable of handling both OSPF and RIP interfaces concurrently.

t with a computer.

ernet suite of protocols, a function that provides intradomain information transfer. An alternative to the Routing Information Protocol (RIP), OSPF allows the 
d IBM mainframe hardware feature that combines the functions of an I/O channel with the functions of a network port to provide direct connectivity between

interconnection of open systems in accordance with standards of the International Organization for Standardization (ISO) for the exchange of information.
standard model designed by the International Standard Organization (ISO) that describes how data must be transmitted over a network.

 running of programs; in addition, an operating system may provide services such as resource allocation, scheduling, I/O control, and data management. A

 a central record of communications and system problems for each system in a sysplex.
m operators an use to get information, alter operations, initiate new operations, or end operations.
ating system directing the operator to perform a specific function, such as mounting a tape reel; or informing the operator of specific conditions within the sy

uration Assistant

ansaction Server
An L3 and L4 technology that enables a system to spread the load of network processing amongst available resources. ILB can be used to im

ork) A framework that provides tools and programming interfaces for managing public key objects that include X.509 certificates and publi

t of Structured Information
ates a series of pulses that pace the computer's electronic system. The oscillator clock synchronizes, paces and coordinates the operations of the computer

s that share output characteristics, such as class, destination, and external writer.
t transcribes specified output data sets onto a system output device independently of the program that produced the data sets.

Overview of Desired Configuration Management Jump .


f binary digits, including data and control signals, that is transmitted and switched as a composite whole. See frame .

and transferring data by means of addressed packets so that a channel is occupied only during transmission of a packet. On completion of the transmissio
ngth block of instructions, data, or both, that can be transferred between central storage and external page storage. (2) To transfer instructions, data, or bot
at occurs when a page that is marked "not in central storage" is referred to by an active page.
e pageable dynamic area that is allocated to a job step or a system task that can be paged during execution. Synonymous with V=V region.
ages between central storage and external page storage.
ge device on which pages are stored.
/360™ and System/370 channel-to-control-unit I/O interface that uses bus-and-tag cables as a transmission medium. Contrast withESCON channel .
andard for a computer peripheral interface, which defines the IBM System/360 and System/370 channel to control unit interface. This interface uses ESA/3
ssing of units of work by many servers. The units of work can be either transactions or subdivisions of large units of work (batch). See highly parallel.
more coupling facilities.
function, command, or program that serves as input or controls actions. The value is supplied by a user or by another program or process. Synonymous wit

LIB data set that contain parameters setting the limits and controlling the behavior of z/OS.
RMLIB data set.

et name in which the qualifiers are not spelled out. Asterisks and percent signs are used in place of the undefined qualifiers.
d into two independent CPCs. See physical partition, single-image mode, side.
ect access storage that is divided into partitions, called members, each of which can contain a program, part of a program, or data. Synonymous with progr
ystem-managed data set that contains an indexed directory and members that are similar to the directory and members of partitioned data sets. A PDSE ca
 configurations from one configuration.
wn to a computer system and to a user, who must specify the character string to gain access to a system and to the information stored within it.
uthentication protocol that can be used to verify the identity of a caller on a PPP link. PAP uses a cleartext password that is passed over the

cations in a communications system. In a network, a patch panel interconnects computers within a local area network (LAN) for connection to the Internet o
s. Any number of patchports can participate in a fiber link. To determine the total number of patchports in a cabinet, you must add the number of patchports 
t consisting of a transmission header (TH) alone, or a TH followed by a basic information unit (BIU) or a BIU segment.

urce is self-contained and controls its own resources.
onnection between DASD controller subsystems that is used primarily to provide a hot standby capability. These connections can be point-to-point from on
manager when the returned value from a condition handler indicates that the handler could not handle the condition, and the condition will be transferred to
that is used to protect transmission of data is not used to derive additional keys. Also, the source of the key that is used to protect data tran

of defining and adjusting workload management goals and resource groups based on installation business objectives.

ned to a traffic class of a packet when traversing a hop.

 interconnects adjacent APPN networks having different network identifiers in order to support LU-LU sessions that have one partner LU in its native netwo
ess) A serial I/O bus that connects a computer with its peripherals.

ommunicate directly with a particular processing unit.
resses for routing and therefore is not affected by changes in network addresses. A peripheral node requires boundary-function assistance from an adjacen
ction over a subnetwork boundary between a border and a network node with no border node function.
tions are usually made between cabinets with fiber trunk cables. Patchports that are permanently connected remain so even when they are not in use.
 that is normally retained for longer than the duration of a job or interactive session. Contrast with temporary data set.

es that program function keys are supported and were specified at system generation.

igned by the machine to a physical channel location.
hysical address of a channel path in the hardware. Logical CHPIDs have corresponding physical channels. Real I/O hardware is attached to a processor thr
pports the SR-IOV capabilities as defined in SR-IOV specification. A PF contains the SR-IOV capability structure and is used to manage the SR

nection reference model, the layer that provides the mechanical, electrical, functional, and procedural means to establish, maintain, and release physical co
es as a CPC in its own right, with its own copy of the operating system.
s of network addressable units. A physical unit exists in each node of an SNA network to manage and monitor the resources (such as attached links and ad
e of a processor complex when its hardware units are divided into two separate operating configurations or sides. The A-side of the processor controller con

h-level language. PL/I is a powerful procedure-oriented language especially well suited for solving complex scientific problems or running lengthy and comp

in which a program runs.

dentified as a contact point for another subnetwork for the purposes of collecting topology information.

which there are many hosts directly attached within the scope of a single network ID.
ransmission between two locations without the use of any intermediate display station or computer.
ocol that provides a standard method for transferring datagrams over point-to-point media. A PPP configuration consists of two endpoint co

ged resources.
hat identifies a port within a host.
D that is assumed for untagged packets sent to and received from a link.

on from one platform to another with relatively few changes to the source code.
IX). Portable Operating System Interface for computing environments, an interface standard governed by the IEEE and based on UNIX. POSIX is not a pro

s the operating system (or other program) without turning off the electrical power of the system.

es hosts to run PPP sessions over an Ethernet link. PPPoE is commonly used with Digital Subscriber Line (DSL) services.

ol that is used to synchronize the system clock across multiple systems in a broadcast domain. The PTP sofware is implemented as the ptpd

ation source code for preprocessor statements that are then executed, resulting in the alteration of the source.

 of PTFs to avoid rediscoveries of the APARs fixed by those PTFs. (2) The SYSMODs delivered on the program update tape.
ion recommendations and HOLDDATA for a product or a service level. PSP information can be obtained from the IBM Support Center.
a data record used to identify the data record or control its use. A primary key must be unique.
a system on paper or other media.
vel flow control mechanism. PFC extends the standard PAUSE frame to include the IEEE 802.1p class of service (CoS) values. In PFC, the traffi

isolate network traffic. PVLAN partitions the VLAN, which is a single broadcast domain into smaller sub-domains.

ent investigates the underlying cause of incidents with the aim of preventing incidents of a similar nature from recurring. By removing errors, which often req

language (HLL) statements that performs a particular task and returns to the caller. Individual languages have different names for this concept of a procedu
e, has a serial number, a set of channels, and a logical processor associated with it. The logical processor has a number of channel path IDs, or CHPIDs, w
s support and diagnostic functions for the central processors.
PR/SM). The feature that allows the processor to use several z/OS images simultaneously and provides logical partitioning capability. See LPAR.

tion programs that are already developed and tested run on a regular basis.
aracteristics of a user, a group of users, or one or more computer resources.

s been found to contain an error. A PE-PTF is identified on a ++HOLD ERROR statement, along with the APAR that first reported the error.

grams for execution by loading them at specific storage locations and readjusting each relocatable address constant.
eyboard of a display device that passes a signal to a program to call for a particular program operation.
e execution of a program due to some event such as an operation exception, an exponent-overflow exception, or an addressing exception.
e, version, and fix level.
SE that always contains named members.
ng programs for execution, storing the programs, load modules, or program objects in program libraries, and executing them on the operating system.
rogram status word (PSW), a 4-bit structure that controls whether each of the fixed-point overflow, decimal overflow, exponent-overflow, and significance ex
A collective term for program object and load module.
he format xxxx-xxx) used by IBM to identify each licensed program.
ogram in a form suitable for loading into virtual storage for execution. Program objects are stored in PDSE program libraries and have fewer restrictions than
ure in central storage used to control the order in which instructions are executed, and to hold and indicate the status of the computing system in relation to
solution or bypass of a problem diagnosed by IBM as resulting from a defect in a current unaltered release of the program.

g rules for, requests and responses used for managing a network, transferring data, and synchronizing the states of network components.
ers and software that work together to process the protocols.
ate to handle the transmission tasks for a communication system.

ital certificates, CAs, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transa

of a string of names separated by periods; for example, "TREE.FRUIT.APPLE" is a qualified name.
than the rightmost name. For example, "TREE" and "FRUIT" are qualifiers in "TREE.FRUIT.APPLE."

em waiting for processing.
nnel architecture for direct data exchange with I/O devices, where both the I/O device and the program running on the server reference main storage directl
M).  An extended version of the basic sequential access method (BSAM). Input data blocks awaiting processing or output data blocks awaiting transfer to au

pace devoted to a company's computing equipment. This space usually includes cooling units, electrical panels, fire suppression equipment, and other sup
ut device or data base file and places them on the job queue.
address of a location in central storage.

e reason for the failure or partial success of an attempted operation.
her data from SMPPTFIN and SMPHOLD and store them on the global zone for subsequent SMP/E processing. This is done with the RECEIVE command.
used to read in SYSMODs and other data from SMPPTFIN and SMPHOLD.
essary to install new product libraries. During this process, the code, organized as unloaded partition data sets, is loaded into temporary SMPTLIB data set

A framework that manages the dynamic removal of system components and helps to register and release system resources in an orderly ma

fields treated as a unit, such as one name, address, and telephone number. record. (2) A self-contained collection of information about a single object. A rec

 structure that are accessed record by record. This data set structure is typical of data sets on z/OS and other mainframe operating systems. Contrast with 
mat of the data on the tape, for example, 18, 36, 128, or 256 tracks.
m can be restored to an operational condition after a system failure.
 it has been damaged or destroyed, often by restoring a backup version of the data or by reapplying transactions recorded in a log.

ace of a primary application system that is no longer available for use. Data from the application system must be available for use on the recovery system. T

f or be called by another routine that it has called.
ctional units, such as several disk drives or power supply systems, within one computer system in order to provide data security and a certain degree of fau
D). A disk subsystem architecture that combines two or more physical disk storage devices into a single logical device to achieve data redundancy.

ws a program to be used concurrently by more than one task. A reenterable module can modify its own data or other shared resources, if appropriate seria
ation that allows more than one user to share a single copy of a load module.

ws a program to be replaced (refreshed) with a new copy without affecting its operation. A refreshable module cannot be modified by itself or any other mod
able of storing a specified amount of data and accepting or transferring this data rapidly.
ge in which contents of registers are saved.
M custom-built offerings, task-oriented documentation, jobs, sample exit routines, procedures, parameters, and examples developed by IBM.

w function and APAR fixes for an existing product. Contrast with modification level and version.
ystem to continue processing without failure.
ery and workload migration function that can copy data in real time to a remote location. Two options of remote copy are available. See peer-to-peer remot
ontrol statements and data from a remote terminal, causing the jobs described to be scheduled and executed as though encountered in the input stream.

s from a host system.
mmunications, a document that describes a part of the Internet suite of protocols and related experiments. All Internet standards are documented as RFCs.

n that precedes a request unit (RU).
ains control information, end-user data, or both.

 central and expanded storage that you can dynamically configure online or offline to a logical partition.
a program module that specifies whether the module, when loaded, must reside below the 16MB virtual storage line or may reside anywhere in virtual stora
hat obtains information from a domain name server or a local table for use by an application program.
An IBM security manager product that provides for access control by identifying and verifying the users to the system, authorizing access to protected resou
M software product that measures and reports on the performance and availability of a system.

S system component that provides the services that a resource manager uses to protect resources. RRS is the z/OS system level syncpoint manager.
nowledges a request unit. It may contain prefix information received in a request unit. If positive, the response unit may contain additional information (such

ODs from the target libraries by use of the RESTORE command.
used to remove applied SYSMODs from the target libraries.
 general-purpose, procedural language for end-user personal programming, designed for ease by both casual general users and computer professionals. I
the primary volume to the secondary volume of only the tracks which have changed since the volume was last in duplex mode.
 indicate its success or failure. It may be used to influence the execution of succeeding instructions or programs.

on that indicates the extent to which it can be reused or shared by multiple tasks within the address space. See refreshable, reenterable, serially reusable.
protocol that maps dynamically between Internet Protocol (IP) and Ethernet addresses. RARP is used to resolve MAC address into an IP add

rminate in the host and must use the same set of subarea nodes and transmission groups as their corresponding forward explicit route.

cates in a Public Key Infrastructure (PKI) that have been revoked and should no longer be trusted. See Revocation list Jump .

ed by an application to the state at its last commit point.

onent of the topology and routing services component that determines the preferred route between a specified pair of nodes for a given class of service.
f network traffic flow. The path selection is made from several paths based on information obtained from specific protocols, algorithms that attempt to identi
tions called by a program. Typically, a routine has a general purpose and is frequently used. CICS and programming languages use routines. (2) A databas
ns path by which a message is to reach its destination.
r message and used to route the message to the proper console.
al Gateway Protocol that routes IPv4 packets and maintains the routing table of all the hosts on the LAN. For more information, see RFC 245

Internet suite of protocols, a protocol used to exchange intradomain routing information and to determine optimum routes between internet hosts. This proto
ation) An Internal Gateway Protocol that routes IPv6 packets and maintains the routing table of all the hosts on the LAN. For more informa

er to find other routers and to remain up to date about the best way to get to reachable networks.
direct datagram forwarding or to establish a connection. The information is passed among routers to identify network topology and destination feasibility.

hine function to be performed.
eing executed. Synonymous with execution time.
ment® runtime routines.
at are used to support the execution of a program. Synonymous with execution environment.

vice access point.

ents of registers are saved.
as resources, such as processors, memory, or storage, are added.
network is trying to determine what ports are open on the target host. The host doing the scan may later be the same host that does a more virulent attack.

voked by authorized programs to take a fast unformatted dump of virtual storage to a data set.

d that protects remote procedures with an authentication mechanism. The Diffie-Hellman authentication mechanism authenticates both th

col that provides communication privacy. With SSL, client/server applications can communicate in a way that is designed to prevent eavesdropping, tamper
manages, protects, and controls access to sensitive information.
specifies security properties from one host to a second host. IKE automates the provision of authenticated keying material for IPsec SAs.

f SAs that specifies cryptographic keys and cryptographic algorithms. The keys and algorithms are used in the secure transmission of data.
ple Mail Transfer Protocol (SMTP) to route mail from one host to another on the network.
roblem determination.

cords are organized on the basis of their successive physical positions, such as on magnetic tape. Contrast with direct data set. (2) A data set in which the c
at allows a program to be executed by more than one task in sequence. A serially reusable module cannot be entered by a new task until the previous task 
 that provides facilities to clients. Examples of a server are a file server, a printer server, or a mail server. (2) A computer that contains programs, data, or pr
that does work on behalf of a transaction manager or a resource manager. For example, a server address space could be a CICS AOR, or an

tems Interconnection (OSI) architecture, the point at which the services of a layer are provided by an entity of that layer to an entity of the next higher layer.

alues for an element. The service level identifies the owner of the element, the last SYSMOD to replace the element, and all the SYSMODs that have updat

reement of the information systems (IS) service to be provided to the users of a computing installation.

omplex that provides for the maintenance of the complex.
odel, a layer that provides services to the next higher layer. (2) Any company that provides services for a fee to its customers, such as telecommunication co

atchable unit. See dispatch .
ed by a work request as calculated by service definition coefficients and CPU, SRB, I/O, and storage service units.

 user of a terminal can communicate with an interactive system; usually, the elapsed time from when a terminal is logged on to the system until it is logged 
st that activates a session between two network accessible units (NAUs) and specifies session parameters that control various protocols during session ac

t end nodes.
hat indicates the severity of the error condition (I, E, or S).

 independently operating computing systems to jointly use common data residing on shared direct access storage devices.
e same for each virtual address space. Because it is the same space for all users, information stored there can be shared and does not have to be loaded in

text input as commands. It may operate on an input stream, or it may interactively prompt and read commands from a terminal.
sical partitioning.

e (spool).  The reading and writing of input and output streams on auxiliary storage devices, concurrently while a job is running, in a format convenient for l
sysplex displays when you can accomplish a given set of tasks from a single workstation, even if you need multiple IBM and vendor products to accomplish

oduct displays when multiple images of the product can be viewed and managed as one image.
n for a multiprocessor (MP) system that allows it to function as one CPC. By definition, a uniprocessor (UP) operates in single-image mode. Contrast with p
vironment in which only one processor (computer) accesses the spool and comprises the entire node.
nly one z/OS system is allowed to be initialized as part of the sysplex. In a single-system sysplex, XCF provides XCF services on the system but does not p

 standard hardware interface that enables a variety of peripheral devices to communicate with one another.
formation about the structure of a user's system as well as information needed to install the operating system on a user's system. The SMPCSI DD stateme

onnection, by gateways, of two or more independent SNA networks to allow communication between logical units in those networks. The individual SNA ne

 concatenation of a port identifier with a TCP/IP address.
edures, rules, and associated documentation of a data processing system. (2) A set of programs, procedures, and, possibly, associated documentation con

 that can be used to sort or merge records in a prescribed sequence.
mbler, written in a source language.

in a programming language that must be translated to machine language before the program can be run.

available for printing) when it is closed. Spin off data set support is provided for output data sets just prior to the termination of the job that created the data 
 a protocol initiated from an end station is acknowledged and processed by an intermediate node on behalf of the final destination. In IBM 6611 data link sw

uxiliary storage device and managed by JES.
d output streams on auxiliary storage devices, concurrently with job execution, in a format convenient for later processing or output operations.
sistance from a system services control point (SSCP) in order to initiate an LU-LU session. It requires an SSCP-LU session.
activate an LU-LU session (that is, send a BIND request) without assistance from an SSCP. It does not have an SSCP-LU session. Currently, only an LU 6
 a system services control point (SSCP) and a logical unit (LU). The session enables the LU to request the SSCP to help initiate LU-LU sessions.
een the system services control point (SSCP) in one domain and the SSCP in another domain. An SSCP-SSCP session is used to initiate and terminate cro

d by an operator using a stand-alone dump program, a special program that can run by itself when an operating system is disabled.

work topology in which every node on the network is connected to a central node or "hub," through which they communicate with each other.
M-supplied option that determines certain conditions that are to exist during the time a VTAM system is operating. Start options can be predefined or specifi
runs unattended as the result of a START command. Started tasks are generally used for critical applications. The UNIX equivalent is a daemon.

he OSPF protocol, in which interfaces and neighboring routers are always classified as being in a particular state. Events on the network causes these stat

ween hosts, networks, or both, by manually entering routes into the routing table. Static routes are not affected by routing daemons and must be updated m
at can receive displays of system status but from which an operator cannot enter commands.
nning of a job step. The restart may be automatic or deferred, where deferral involves resubmitting the job. Contrast with checkpoint restart.

processing center who is responsible for defining, implementing, and maintaining storage management policies.

s that identify performance goals and availability requirements, defined by the storage administrator, used to select a device that can meet those goals and
es and attributes, defined the storage administrator. The collections can be a group of DASD volume or tape volumes, or a group of DASD, optical, or tape v
 set allocation, placement, monitoring, migration, backup, recall, recovery, and deletion. These can be done either manually or by using automated process
 facility used to automate and centralize the management of storage. Using SMS, a storage administrator describes data allocation characteristics, perform
nsport layer protocol that provides connection-oriented communications in a manner similar to TCP. Additionally, SCTP supports multihom

. The term usually refers to a physical string of units, but may mean a collection of I/O devices which are integrated into a control unit.
nd manage storage on a Coupling Facility. See cache structure, list structure, lock structure.

ea for which packets can flow into and out of, but not through.
ting of a subarea node, attached peripheral nodes, and associated resources. Within a subarea node, all network accessible units (NAUs), links, and adjac
their directly attached peripheral nodes, and the transmission groups that connect them.
re that defines the placement of devices either relative to a channel subsystem or to an operating system.

e a set of common characteristics, such as the same network ID. (2) A distinct partitioned piece of an internet network represented by two or more sets of a
ocated under a subpool number for a particular task.
m, or programming support, usually capable of operating independently of or asynchronously with a controlling system. Examples are CICS and IMS.
t provides communication between z/OS and its job entry subsystem.
a task that is initiated and terminated by a higher order task (the main task). Subtasks run the parallel functions, those portions of the program that can run i
ithout restrictions. A superuser has the special rights and privileges needed to perform administrative tasks. The z/OS equivalent is a user in privileged, or s
 to access and modify any part of the operating system, usually associated with the user who manages the system.
 the use of resources and maintains the flow of processing unit operations.
rrupts a program being executed and passes control to the supervisor so that it can perform a specific service indicated by the instruction.

l element of a processor that assists in many of the processor operational functions. (2) A hardware unit that provides communications, monitoring, and diag
ces in a dual copy or remote copy volume pair is being updated because of either a permanent error condition or an authorized user command. All writes to

the execution of a supervisor call instruction, causing control to be passed to the supervisor.
erforms or begins a control program service specified by a supervisor call instruction.

wapping operation.
s the active pages of a job to auxiliary storage and reads pages of another job from auxiliary storage into central storage.
pability and control for attaching any two ESCON or FICON links together.
DS). A high-speed technology offered by telephone companies in the United States.

n which a series of SYN packets are received in a short period of time. A SYN is the first packet received when a remote host is attempting a TCP connectio
protocol for managing synchronous information transfer over a data link connection.
ssages issued by a z/OS system during certain recovery situations.
tes the two-phase commit process for protected resources, so that all changes to data are either committed or backed out. In z/OS, RRS can act as the sys
 programming language and the construction of a statement in a programming language.
 used as the data definition name of a data set in the input stream.
get library in which an element is installed. (2) A concatenation of macro libraries to be used by the assembler. (3) A set of routines used by the link-edit utilit

icator used in data definition statements to signify that a data set is to be written on a system output unit.
ific characteristics and written on a specific output device. Each system has its own set of SYSOUT classes, designated by a character from A to Z, a numb
g and cooperating with each other through certain multisystem hardware components and software services to process customer workloads. See Parallel S
hat contains sysplex-wide data about systems, groups, and members that use XCF services. All z/OS systems in a sysplex must have connectivity to the sy
OS that increases availability through a combination of dynamic VIPA and the z/OS Workload Manager.
ronizes the time-of-day (TOD) clocks in multiple processors or processor sides.

ardware) and the operating system (software). Often referred to simply as the z/OS system.
ating system's inability to process a routine; may be caused by errors in the logic of the source routine.

rface defined by z/OS that enables programs to use system authorization services in order to protect access to resources such as data sets and z/OS com
the main circuit board that supports a variety of basic system devices, such as a keyboard or a mouse, and provides other basic system functions.

 to the processor controller used to initialize a z/OS system.
at handles the transfer of data and control information associated with storage requests between the elements of the processor.
 or its subsystems for initialization.
.  A panel-based product that provides detailed information about jobs and job output, devices (printers, punches, initiators, lines, spool offloaders and spool
s in which the parts of an operating system are stored.
OS component that provides the means for gathering and recording information for evaluating system usage.
 the input data that defines the introduction, replacement, or updating of elements in the operating system and associated distribution libraries to be installe
SMP/E). An IBM program product, or an element of OS/390 or z/OS, used to install software and software changes on z/OS systems. SMP/E consolidates 
erforming system-oriented procedures.
enerates, maintains, extends, and controls the use of an operating system with the aim of improving overall productivity of an installation.
 of virtual storage reserved for system-related control blocks.
al point in an SNA network for managing configuration, coordinating network-operator and problem-determination requests, and providing directory support

as been assigned a storage class.
d by the storage management subsystem (SMS) of z/OS.

 description of the logical structure, formats, protocols, and operational sequences for transmitting information units through, and controlling the configuratio

ame. The tailgate allows access to the I/O and other types of wiring and cables from internal mainframe parts. This internal wiring and cabling emerges from
ata can be stored.
ed by a volume label, which contains data sets or objects and available free space. A tape volume is the recording space on a single tape cartridge or reel. 
sets in which the various parts of an operating system are stored. These data sets are sometimes called system libraries.

records describing the target system macros, modules, assemblies, load modules, source modules, and libraries copied from DLIBs during system generat
g environment, one or more sequences of instructions treated by a control program as an element of work to be accomplished by a computer.
at contains information and pointers associated with the task in process.

a data circuit external to a data circuit-terminating equipment (DCE) that connects the DCE to a data-switching exchange (DSE), that connects a DCE to on
tocol that provides remote terminal connection service. It allows users of one host to log on to a remote host and interact as directly attached terminal users
d and deleted in the same job.
ual storage, and channel volume, 2 to the 40th power or 1 099 511 627 776 bytes. For disk storage capacity and communications volume, 1 000 000 000 0
sually equipped with a keyboard and display device, capable of sending and receiving information.
on devoted to managing the terminal network.
ch as a program.
s required to get the packet to its destination.
n addresses for the packet. An option within the header allows further bytes to be added. The IPv4 header contains 20 bytes of data and th
the IP addresses that must be used on those L2 networks.
s multiple nodes.

torage, use, and replacement of keys at the user level, either between users or systems.

Application Progamming Interface. Also known as MS-CAPI. An API in Windows operating systems for applications using cryptography.
her VNICs on the same datalink.
ystore name is also called the 'token' or 'token ID'.
machine can call any number of dial-in servers. The dial-out machine typically provides authentication credentials before the dial-up link ca
call from a dial-out machine. Though the term “dial-in server” is in common use, the dial-in server does not function in accordance with th
flow is set to high, all the packets belonging to that flow are processed ahead of other packets on the same datalink. This property is used t
he local MAC address.
ng correctly afer a failure.
evice no longer works. IP network multipathing
ading, higher throughput is achieved. Load spreading occurs only when the network traffic is flowing to multiple destinations that use multi

than at their next scheduled time.


eters, either periodically or in response to a router solicitation message.

vel programming language that was designed to run on the third generation of computer processors, built on integrated circuit technology roughly from 1965

rmation transmitted over a network in a given period of time. Throughput is a measure of performance. It is generally measured in bits per second (bps), kil
age and are controlled by a single copy of z/OS. See loosely coupled, tightly coupled multiprocessor.
puting systems operating simultaneously under one control program while sharing resources.
with multiple CPs.

 The facility in z/OS that allows users to interactively share computer time and resources.
e control remains in a "long busy" condition before physical sessions are ended.

02.5, network technology that controls media access by passing a token (special packet or frame) between media-attached stations. (2) A FDDI or IEEE 80
base, network topology database.
ge about a new or changed link or node that is broadcast among APPN network nodes to maintain the network topology database, which is fully replicated

gy for calculating the actual cost of owning a product over the period of ownership and use based on combining costs of acquisition or leasing, training, dep

or diskette on which information is magnetically recorded and from which recorded information is read.
 or more transaction programs, involving a specific set of input data and initiating a specific process or job.

semiconductors to amplify an electrical signal, and switch electrical current on and off.
area that can have traffic passing through it.
mmunications protocol used in the Internet and in any network that follows the U.S. Department of Defense standards for internetwork protocol. TCP provid
rotocol (TCP/IP). A hardware independent communication protocol used between physically separated computers. It was designed to facilitate communica
etween adjacent nodes that is identified by a transmission group number. (2) In a subarea network, a single link or a group of links between adjacent nodes
on, optionally followed by a basic information unit (BIU) or a BIU segment, that is created and used by path control to route message units and to control th
mmunication line .
message unit that determines its precedence for being selected by the path control component in each node along a route for forwarding to the next node in

des end-to-end communications between two parties, while hiding the details of the communications network. The TCP and ISO TP4 transport protocols pro
tandard that uses encryption to provide confidentiality and authentication between two TCP/IP applications.
es governing the exchange of information between components of a transport network.

metric-key encryption method that applies the Data Encryption Standard (DES) cipher algorithm to encrypt data three times. 3DES requires

r in a DD statement. It specifies that space is to be allocated by tracks.
switching systems, as opposed to connecting a customer line to a switching system.
t connections between cabinets and which remain in place even when not in use.

Option/ Extensions (TSO/E).

sists of two insulated electrical conductors twisted together to reduce noise.

te changes to SMP/E data sets. Actual changes are made by subsequent UCL statements.

standard that supports the interchange, processing, and display of text that is written in any of the languages of the modern world. It also supports many cla

t has one central processor.

ne node that is committed or backed out as part of an ACID transaction. A UR is implicitly started the first time a resource manager touches a protected res
nd Integration

ee that is physically contained on a single device or disk partition and that can be separately mounted, dismounted, and administered. See hierarchical fil
m, developed by Bell Laboratories, that features multiprogramming in a multiuser environment. The UNIX operating system was originally developed for use

 data set entries in the form of UCL statements, by use of the UNLOAD command.
used to copy data out of SMP/E data set entries in the form of UCL statements.
n recently disconnected, but not yet placed in inventory.

tions to continue to run on later releases of z/OS, without the need to recompile or relink.

f SQL Server. See Use Dynamic Management Views (DMVs) to Monitor Analysis Services Jump .
nt without a VLAN or VXLAN. There is no VLAN tagging or other types of network segregation.
the operating system to abnormally terminate a routine. Contrast with system abend.
same way as the master catalog and pointed to by the master catalog. It also lessens the contention for the master catalog and facilitates volume portabilit

net suite of protocols, a protocol that provides unreliable, connectionless datagram service. It enables an application program on one machine or process to
cific point in an application. User exits are often used to provide additional initialization and termination functions.
r symbol identifying a system user.

a change constructed by a user to modify an existing function, add to an existing function, or add a user-defined function. USERMODs are identified by the

Transact-SQL, a temporary named result set defined within the execution scope of a single SELECT, INSERT, UPDATE, DELETE, or CREATE VIE
applications access to a subset of the SharePoint Foundation server object model. See Using the Client Object Model Jump .

ngth independent of the length of other records with which it is logically or physically associated. Contrast with fixed-length record.

service or product to another person or company.

based on an existing licensed program and that usually has significant new code or new functions. Contrast with release and modification level.

ems, the virtual storage assigned to a job, terminal user, or system task. See address space.

f data sets that exist in paging storage only.

t is not associated with any physical interface.

rm to describe a secure tunnel (data stream) between two endpoints. The term does not describe a protocol. The industry standard protocol for a VPN is an
gical connection between two subarea nodes that is physically realized as a particular explicit route or (b) a logical connection that is contained wholly within

an be regarded as addressable main storage by the user of a computer system in which virtual addresses are mapped into real addresses. The size of virtu
n access method for direct or sequential processing of fixed-length and varying-length records on direct access devices. The records in a VSAM data set or 
od (VTAM). A set of programs that maintain control of the communication between terminals and application programs running under z/OS. Now known as
e or optical devices, which is identified by a volume label. (2) That portion of a single unit of storage which is accessible to a single read/write mechanism, f
to protect against the loss of the volume.
e label that is assigned when a volume is prepared for use in the system.

on a direct access storage device (DASD) volume that describes the location, size, and other characteristics of each data set on the volume.

depends on one or more events in order to enter the ready condition. (2) The condition of a processing unit when all operations are suspended.

ation server software that runs on a Web server and that can be used to deploy, integrate, execute, and manage e-business applications.
ograms that provides message queuing services.
mpasses tools for developing e-business applications and middleware for running Web applications.
s, one of a set of preassigned protocol port numbers that address specific functions used by transport level protocols (for example, TCP and UDP).
ement. A command line tool or PowerShell cmdlets to service Windows images. See What is DISM? Jump
the Azure Database Migration Service? Jump
provides communication services between devices in a geographic area larger than that served by a local area network (LAN) or a metropolitan area netwo

multiple character replacement in classification rules.
Windows Automated Installation Kit (Windows AIK) Jump .
cation Library. See Azure AD Authentication Library for .NET Jump .
Management. See Azure Rights Management Jump .

uest for service, a batch job, an APPC, CICS, or IMS transaction, a TSO LOGON, or a TSO command.

naged and reported as a unit.
mponent that prioritizes workloads and matches them with available resources.

uthoring and Versioning


allows a separator line between old and new messages to move down a full screen as new messages are added. When the screen is filled and a new mess
sage sent to an operator console informing the operator of errors and system conditions that may need correcting.
ssage. A message sent to an operator console informing the operator of errors and system conditions that may need correcting. The operator must enter a 
frame computers and peripherals. The zSeries family of servers uses the z/Architecture.
 mainframe computers that uses 64-bit central storage.
are product that provides a common runtime environment and common runtime services for conforming high-level language compilers.
/OS services that support a UNIX-like environment. Users can switch between the traditional TSO/E interface and the shell interface. UNIX-skilled users ca

P). A specialized processing assist unit configured for running Java programming on selected zSeries machines.
ystem that stores files in VSAM linear data sets.
associated with an elastic virtual switch. The block of IPv4 or IPv6 addresses exists on the same subnet with a default router for the block
s two different keys that are mathematically linked. The public key is available to everyone. The private key is known only to the recipient o
on a single link for purposes such as automatic address configuration in IPv6. By default, the link-local address is created from the system's
ronically transmitted message that uniquely identifies the sender.
to send inter-VM traffic on the wire to be looped back by the external switch and enables the consolidation of multiple hosts into multiple V
to allow or disallow specified packets through a firewall.
nes, which transfer data one character at a time. The most common form of PPP configuration, the dial-up link, uses asynchronous PPP com
d as a unit over communication lines. Contains a MAC header and a payload, and possibly also contain an IP header.
ast IPv6 address. The Oracle Solaris implementation of IPv6 does not support the creation of anycast addresses and groups. However, Orac
virtual switch.
ed fabrics. It provides high bandwidth, low latency interconnect for attaching I/O devices to hosts and for host-to-host communication. Infin
mber of routers that separate two hosts. If three routers separate a source and destination, the hosts are four hops away from each other.
and public key cryptosystems.
system into a single logical unit to increase the throughput of network traffic and provide high availability. Link aggregation is an L2 entity t
ource consumption statistics on a task, process, flow, or network component. You can regularly record the datalink and flow statistics over a
s about network traffic in a log file for tracking, provisioning, consolidation, or billing purposes.
marks a packet with a value that indicates how the packet must to be forwarded.
measures the rate of traffic flow for a particular class. The IPQoS implementation includes two meters, tokenmt and tswtclmt.
tured by an intruder during data transmission. The captured packet is either replaced with a fraudulent packet or repeated later. To protect
he instantiated configuration on the system is persistent, regardless of whether any changes in network conditions occur. When such chang
he system automatically adapts to any change in the network condition without requiring manual reconfiguration.
er connected to a computer network. A network host provides services, information resources, and applications to users or other nodes on
send datagram packets to multiple systems on an IP network. Unlike broadcast routing, packets are not handled by every system. Multicas
nternet to solicit a response. Such packets are commonly known as "ping" packets and are used to test the reachability of the hosts on an IP
uplink port that can communicate with both the isolated and the community VLANs.
iate switches to allow PVLAN traffic to span multiple switches.
d a CSU/DSU that are connected to a synchronous network medium leased from a provider. Optical Carrier 3 (OC3) and T carrier (T1) are co
d a modem at either end of a telephone line or similar communications medium, such as a medium that is provided by ISDN. The term “dia
information about traffic flows in IPQoS. Flow accounting can be established by defining parameters for the flowacct module in the IPQoS c
sage or the process of a node sending unsolicited neighbor advertisements to announce a link-layer address change.
UUCP chat scripts. The chat script begins with the text or instruction to expect from the remote peer. The next line contains the response
cs of a class in the IPQoS configuration file. The IPQoS system selects for processing any traffic flows that conform to the filters in its IPQoS
dministering the network topology of sites with multiple routers and networks. This routing domain is a connected group of one or more IP
ermine the link-layer address of a neighbor. A neighbor solicitation also verifies that a neighbor is still reachable by a cached link-layer addr

takes a variable-length key from 32 bits to 448 bits. Its author, Bruce Schneier, claims that Blowfish is optimized for applications where the k
e and that does not perform packet forwarding. A multihomed host can run routing protocols.
e, runs routing protocols, and forwards data packets between computer networks. Routers direct traffic on the Internet and connect two o
mber of computer systems to form a local area network. Ethernet can use protocols to control the passing of information and to avoid simu
chment is ofen implemented as a device driver plus a NIC. Some NICs can have multiple points of attachment, for example, igb.
tion for a packet, which helps to determine the best path for the packet to reach its destination.
IPv4 and IPv6 protocols to operate on the same network infrastructure without the use of tunneling mechanism. Oracle Solaris networkin
h directions.
omatically updates the routing table by using routing protocols such as RIP for IPv4 networks and RIPng for IPv6 networks. Dynamic routing
ociated with community VLANs can communicate with the primary VLAN and the other ports that are in the same community VLAN. Multip
are associated with this type of VLAN can communicate only with the primary VLAN and not with any other secondary VLAN. Only one iso
of the IP packets over IB connections. A partition key must be specified when this VNIC is created.
uteability scope (within the subnet or within a subscriber network). This address also can have a local or global uniqueness scope.
d at the datalink layer (L2) of the Oracle Solaris network stack. You can create VNICs over etherstubs instead of physical links for the purpos
m other virtual networks that are on the system, as well as from the external network. Private virtual networks are configured over etherst
is configured by using the zonecfg command for Oracle Solaris Zones and instantiated when the zone boots. See also VNIC.
but not in the master state is called a backup router. Any number of backup routers can exist for a VRID. A backup router assumes the role o
g function for the virtual router at a given time. Only one master router is active at a time for a given VRID. The master router controls the
dentification purposes and is known to both peers on a PPP link.
ent protocol that enables two users to exchange a secret key over an insecure communication medium without any prior information. Asym
ts intentionally or inadvertently overwhelm a server. A server’s throughput can be significantly impacted or the server can become overloa
transfers IPv6 packets over an IPv4 network. 6to4 tunnels enable isolated IPv6 sites to communicate across an automatic tunnel over an IPv
r and receiver of a message use different keys to encrypt and decrypt the message. Asymmetric keys can be used to establish a secure chan
the guest operating system and is the equivalent of the physical NIC in the host, for example, zvnet in the kernel zone.
nected devices share their capabilities regarding transmission parameters, such as speed, duplex mode, and flow control. The connected de
age elastic virtual switches.
ntication and integrity without confidentiality to IP datagrams.
and another server. It provides caching service, administrative control, and security. For example, a proxy server can be used to prevent acc
ectural standard for implementing differentiated services on IP networks. In an IP network, the diffserv model provides a simple and scalab
rce or destination address for data. Data addresses are part of an IPMP group and can be used to send and receive traffic on any interface
source address for data in an IPMP group. Usually, IPMP test addresses are DEPRECATED. However, any address can be marked DEPRECATE
gh the Internet. Private addresses can used by internal networks on hosts that do not require Internet connectivity. For more information a
cate other hosts that reside on an attached link.
of network interfaces with a set of data addresses that are treated as interchangeable by the system to improve network availability and u
ortion of the address containing all zeroes (192.0.2.00) or all one bits (192.0.2.255). A packet that is sent to a broadcast address from a syst
roup of interfaces. A packet that is sent to a multicast address is delivered to all of the interfaces in the group. Multicast packets are receiv
p of interfaces, usually belonging to different nodes. A packet that is sent to an anycast address is routed to the nearest interface having th
g that can be supported by home agents, foreign agents, and mobile nodes. Minimal encapsulation has 8 or 12 bytes less of overhead than
ME, also known as CIS.
nes the metadata attributes of parameters used in a business protocol, delivery protocol, or transport. Examples of xADs include: BPAD=BA
net Draf security standard defined by the IETF (Internet Engineering Task Force), designed to allow business transactions to move securely

re those that occur between business partners in the context of e-commerce.


ns (BADs) define the metadata attributes of message payload parameters used in business protocols such as X12, HIPAA, EDIFACT, or CIDX.

Definitions (BPADs) define metadata for business protocols such as X12, HIPAA, EDIFACT, or CIDX. A BPAD consists of one Business Attribute
orm Suite (Java CAPS) includes eGate Integrator, eInsight Business Process Manager eXchange Integrator, eWay Intelligent Adapters, OTD Li

DX) is a non-profit organization dedicated to improving the ease, speed and cost of securely conducting business electronically in the chem

Definitions (DPADs) define metadata for delivery protocols such as AS2, ebXML, or RNIF. A DPAD consists of one Messaging Attributes Defin

tions (EADs) define the metadata attributes of message envelope parameters used in business protocols such as X12, HIPAA, EDIFACT, or CID
sible markup language; see “XML”) whose implementation includes specifications for messaging, collaboration profiles, business processes
eb-based GUI for defining and managing Trading Partner (TP) information.
t protocol for sending and receiving files. Specifications for FTP include RFCs 959, 1635, 2228, and 2577.
transport protocol for transmitting information referenced in a URL of the form http://hostname:port/.../.... Specifications for HTT
d an Integrated Composite Application Network (ICAN) Suite that included eGate Integrator, eXchange Integrator, various eWay Intelligent
l is a standard networking protocol for querying and modifying information stored as a distributed nonrelational database in directory serv
ons (MADs) define the metadata attributes of messaging parameters used in delivery protocols such as AS2, ebXML, or RNIF. Each MAD co

MIME) extends the format of basic Internet mail to allow non-textual messages, multipart message bodies, and so forth. Specifications for M
so known as RSE. It contains CDT, DT, AC, MBA. and ASO.
OTD) contains the data structure and rules that define an object. OTDs are used in Java collaborations to transform data interface with exter
ons (PADs) define the metadata attributes of packaging parameters used in delivery protocols such as AS2, ebXML, or RNIF. Each PAD comb

as RA Schema.

ntation Framework (RNIF) is to allow trading partners to configure their business processes in such a way as to operate with other trading p
sions (S/MIME) provides a consistent way to send and receive secure MIME data, using digital signatures for authentication, message integ
e (SME) uses advanced cryptographic techniques to ensure security, verifiability, and non-repudiation of messages exchanged electronically
transport protocol for transmitting e-mail messages between servers or from client to server. Specifications for SMTP include RFCs 1651, 2
ons (TADs) define the metadata attributes of parameters used in transport protocols such as FTP or HTTP.
et Protocol is a standard suite of communication protocols for connecting hosts and transmitting data over the Internet.
ne or more Trading Partner Profiles (TPPs) that contain information identifying the values of messaging, enveloping, and/or transport param

ing that identifies information, such as a particular piece of information shared by a particular host.
a language whose syntax obeys an official schema, called “the XML schema”, but whose semantics (“vocabulary”) are open.
fines the criteria to be applied to packets of a particular class in order to select that traffic from the network stream. You define selectors in
gent and uses a configuration file to provide aliasing and forwarding, automatic routing to network gateways, and flexible configuration.
that operates on any input length less than 264 to produce a message digest. The SHA-1 algorithm is input to DSA.
ock sizes, for example SHA-256 and SHA-512.
nables clients to access files and request services of a server on the network.
hat defines the relationships between applications or services so that dependent services can be automatically restarted when necessary.
ongestion or outages by using ICMP echo request packets directed to an IP broadcast address or multiple broadcast addresses from remote
uently used as part of automated programs to sif information, such as clear–text passwords, off the wire.
A protocol that provides a common way to query, monitor, and manage devices that are connected to IP networks.
t specifies the level of protection to apply to a packet protected by IPsec. The SPD filters IP traffic to determine whether a packet must be d
t specifies the row in the SADB that a receiver uses to decrypt a received packet.
er by sending a message to it with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, the se
d that enables efficient sharing of Peripheral Component Interconnect Express (PCIe) devices among virtual machines and is implemented i
w-level encryption that is used by protocols like HTTP and FTP. The SSL protocol includes provisions for server authentication, encryption of
ccelerate web server communications that are protected by the secure sockets layer (SSL). The SSL kernel proxy is also known as KSSL.
data traffic only if some other physical interface has failed.
of active connections and use the information obtained to determine which network packets to allow through the firewall. By tracking and
Pv6 addresses by combining its MAC address and an IPv6 prefix that is advertised by a local IPv6 router.
dministrator can manually add routes to the routing table.
ol used by the bridged networks to prevent network loops that render the subnetworks unusable.
t connects systems with subnet numbers and IP address schemas, including their respective netmasks. See IP address.
r and receiver of a message share a single common key. This common key is used to encrypt and decrypt the message. Advanced Encryptio
s digital lines, which transfer data as a continuous stream of raw bits. A leased-line PPP link uses synchronous PPP.
al switch and its resources. The resources are not visible outside the tenant's namespace.
ust be used as the source or destination address for probes, and must not be used as a source or destination address for data traffic.
er protocol that is used to transfer files between the network configuration servers and the network clients. TFTP is generally used for the a
ks) A protocol that is used by bridged networks to prevent network loops without disabling links. TRILL computes the shortest-path informa
EE 802.3ad standard. Trunk aggregations work by enabling multiple flows of traffic to be spread across a set of aggregated ports. The IEEE 8
grants access to by including the peers' security credentials in the server's PAP or CHAP secrets database.
a computer uses to send datagrams to other computers on an IP network without setting up special transmission channels or data paths. F
terface of an IPv6-enabled node. The parts of the unicast address are site prefix, subnet ID, and interface ID.

when you use the Oracle Solaris EVS feature.


ng technology that identifies resources on the Internet or a private intranet.
racters that identifies a resource on the Internet or a private intranet.
rvice (CoS) marks. CoS defines how Ethernet datagrams are forwarded on a network of VLAN devices.
that enables computers to transfer files and exchange mails with each other. UUCP also enables computers to participate in large network
l) A protocol used by EVB to exchange information about VSIs (Virtual Switch Interfaces).
s associated with a Physical Function. A VF is a lightweight PCIe function that shares one or more physical resources with the Physical Functi
ork and is a combination of hardware and sofware network resources.
IC and an elastic virtual switch. A virtual port encapsulates various network configuration parameters that is inherited by the VNIC when it
between virtual machines. The virtual switch loops traffic between virtual machines (inter-VM traffic) within the physical machine and does
of a local area network at the datalink layer of the protocol stack.
hat provide traffic forwarding at the Ethernet (datalink) level of the IP protocol stack.
entified by using VXLAN segment IDs, which are also known as VNIs. Every VXLAN datalink is associated with a VNI.
tity or virtual network device that behaves just like a physical NIC when configured. You configure a VNIC over an underlying datalink to sha
logical network that uses tunnels across a public network such as the Internet.
d to identify a virtual router on a given network segment. VRIDs identify the virtual router within a LAN.
ted with a VRID from which other hosts can obtain network service. The VRIP is managed by the VRRP instances belonging to a VRID.
rotocol that provides high availability of IP addresses, such as those that are used for routers and load balancers. For more information, see
NIC that is configured on the station.
L2 and L3 technology that works by overlaying a datalink (L2) network on top of an IP (L3) network. VXLANs address the 4K limitation that
d protocol to access information over a mobile wireless network.
establishes connections with a secure Wi-Fi network.
tem must satisfy in order to be accepted by a user, customer, or other authorized entity. [IEEE 610]
s, requirements, and business processes conducted to determine whether or not a system satisfies the acceptance criteria and to enable th
users with disabilities can use a component or system. [Gerrard]
provide the right or agreed results or effects with the needed degree of precision. [ISO 9126] See also functionality testing.
a component or system is tested.
test preparation takes place, no recognized test design technique is used, there are no expectations for results and randomness guides the
be adapted for different specified environments without applying actions or means other than those provided for this purpose for the sof
methodologies, such as extreme programming (XP), treating development as the customer of testing and emphasizing the test-first design p
y potential users/customers or an independent test team at the developers’ site, but outside the development organization. Alpha testing
be diagnosed for deficiencies or causes of failures in the sofware, or for the parts to be modified to be identified. [ISO 9126] See also mai
ation based on requirements specifications, design documents, user documents, standards, etc. or from someone’s perception or experienc
be attractive to the user. [ISO 9126]
products or processes to ascertain compliance to standards, guidelines, specifications, and/or procedures based on objective criteria, includ
h as tool scripts.
tem is operational and accessible when required for use. Ofen expressed as a percentage. [IEEE 610]
a component or system are executed with the same inputs, the outputs compared, and analyzed in cases of discrepancies. [IEEE 610]
has been formally reviewed or agreed upon, that thereafer serves as the basis for further development, and that can be changed only thro
executable statements containing no branches.
nal structure or specification to ensure that 100% of a specified coverage criterion is achieved.
to a set of input values and preconditions.
nts or comparisons can be made. (2) A test that is be used to compare components or systems to each other or to a standard as in (1). [Af
of users or customers. The opposite is off-the-shelf sofware.
e that contributes to the improved performance of an organization under given context, usually recognized as ‘best’ by other peer organizati
xisting users/customers at an external site not otherwise involved with the developers, to determine whether or not a component or syste
fware elements, hardware elements, or both are combined all at once into a component or an overall system, rather than in stages. [Afer I
lect test cases based on an analysis of the specification, either functional or non-functional, of a component or system without reference to
nal, without reference to the internal structure of the component or system.
ause the preconditions for its execution are not fulfilled.
esting where the lowest level components are tested first, and then used to facilitate the testing of higher level components. This process i
ch test cases are designed based on boundary values.
have been exercised by a test suite.
on the edge of an equivalence partition or at the smallest incremental distance on either side of an edge, for example the minimum or max
en exercised by a test suite. 100% branch coverage implies both 100% decision coverage and 100% statement coverage.
ch test cases are designed to execute branches.
ecution based on a program construct in which one of two or more alternative program paths are available, e.g. case, jump, go to, ifhen- e
es are designed based on descriptions and/or knowledge of business processes.
bes the key elements of an effective sofware process. The Capability Maturity Model covers practices for planning, engineering and mana
ments of an effective product development and maintenance process. The Capability Maturity Model Integration covers practices for planni
ts are recorded during manual testing in order to generate automated test scripts that can be executed later (i.e. replayed). These tools are

esting. See also test automation.


/or stimuli (causes) with their associated outputs (effects), which can be used to design test cases.
ch test cases are designed from cause-effect graphs. [BS 7925/2]
nent, system or person complies with its specified requirements, e.g. by passing an exam.
enable specified modifications to be implemented. [ISO 9126] See also maintainability.
ch test cases, described by means of a classification tree, are designed to execute combinations of representatives of input and/or output d
ch parts of the sofware have been executed (covered) by the test suite and which parts have not been executed, e.g. statement coverage,
co-exist with other independent sofware in a common environment sharing common resources. [ISO 9126] See portability testing.
tem has a design and/or internal structure that is difficult to understand, maintain and verify. See also cyclomatic complexity.
compliance of component or system.
adhere to standards, conventions or regulations in laws and similar prescriptions. [ISO 9126]
he interfaces and interaction between integrated components.
in terms of its output values for specified input values under specified conditions, and required non-functional behavior (e.g. resource-util
nents. [Afer IEEE 610]
ed in isolation.
means of a logical operator (AND, OR or XOR), e.g. ‘A>B AND C>1000’.
e of two or more activities within the same interval of time, achieved either by interleaving the activities or by simultaneous execution, is h
hat have been exercised by a test suite. 100% condition coverage requires each single condition in every decision statement to be tested as
tcomes that independently affect a decision outcome that have been exercised by a test case suite. 100% condition determination coverag
ch test cases are designed to execute single condition outcomes that independently affect a decision outcome.

ch test cases are designed to execute condition outcomes.


d as True or False, e.g. A>B. See also test condition.
libraries of configuration items, e.g. for standards compliance. [IEEE 610]
nt, consisting of the evaluation, co-ordination, approval or disapproval, and implementation of changes to configuration items afer formal e
nt, consisting of selecting the configuration items for a system and recording their functional and physical characteristics in technical docum
both, that is designated for configuration management and treated as a single entity in the configuration management process. [IEEE 610]
nistrative direction and surveillance to: identify and document the functional and physical characteristics of a configuration item, control ch
em as defined by the number, nature, and interconnections of its constituent parts.
n, and freedom from contradiction among the documents or parts of a component or system. [IEEE 610]
sequences of events (paths) in the execution through a component or system.
from existing systems for use in replacement systems.

specified coverage item during test execution referring to predetermined criteria to determine whether additional testing is required and i
test coverage, e.g. equivalence partitions or code statements.
of what structural elements, e.g. statements, branches have been exercised by the test suite.
o which a specified coverage item has been exercised by a test suite.
gh a program. Cyclomatic complexity is defined as: L – N + 2P, where – L = the number of edges/links in a graph – N = the number of nodes
e is assigned a value.
ut and expected results in a table or spreadsheet, so that a single control script can execute all of the tests in the table. Data driven testing i
finition and usage of variables.
at have been exercised by a test case suite.
ch test cases are designed to execute definition and use pairs of variables.
ce and possible changes of the state of data objects, where the state of an object is any of: creation, usage, or destruction. [Beizer]
e failures, investigate the state of programs and find the corresponding defect. Debuggers enable programmers to execute programs step b
oving the causes of failures in sofware.
s and decision outcomes that have been exercised by a test suite. 100% decision condition coverage implies both 100% condition coverage
ch test cases are designed to execute condition outcomes and decision outcomes.
t have been exercised by a test suite. 100% decision coverage implies both 100% branch coverage and 100% statement coverage.
determines the branches to be taken).
ch test cases are designed to execute the combinations of inputs and/or stimuli (causes) shown in a decision table. [Veenendaal]
nd/or stimuli (causes) with their associated outputs and/or actions (effects), which can be used to design test cases.
ch test cases are designed to execute decision outcomes.
w has two or more alternative routes. A node with two or more links to separate branches.
mponent or system divided by the size of the component or system (expressed in standard measurement terms, e.g. lines-ofcode, number o
ase, divided by the number found by that test phase and any other means aferwards.
taking action and disposing of defects. It involves recording defects, classifying them and identifying the impact. [Afer IEEE 1044]
nts the detection of another. [Afer IEEE 610]
mponent or system that can cause the component or system to fail to perform its required function. [Afer IEEE 829]
cause the component or system to fail to perform its required function, e.g. an incorrect statement or data definition. A defect, if encount
able with the use of that variable. Variable uses include computational (e.g. multiplication) or to direct the execution of a path (“predicate”
d to someone other that the (work) product’s author.
s are designed based on the architecture and/or detailed design of a component or system (e.g. tests of interfaces between components o
nual simulation of its execution.
ing the implementation of a component or system, usually in the development environment by developers. [Afer IEEE 610]
e.g. user guide or installation guide.
tput values can be selected.
eplaces a component that takes care of the control and/or the calling of a component or system. [Afer TMap]
memory performance, CPU usage, of a system or component during execution. [Afer IEEE 610]
ts, performed while the sofware is being executed, for example by a test execution tool.
sofware of a component or system.
fficiency of a sofware product.
provide appropriate performance, relative to the amount of resources used under stated conditions. [ISO 9126]
ch test cases are designed to execute combinations of inputs using the concept of condition determination coverage. [TMap]
hat accepts the same inputs and produces the same outputs as a given system. [IEEE 610] See also simulator.
for permitting a process to go forward with a defined task, e.g. test phase. The purpose of entry criteria is to prevent a task from starting w

that have been exercised by a test suite.


or which the behavior of a component or system is assumed to be the same, based on the specification.
h test cases are designed to execute representatives from equivalence partitions. In principle test cases are designed to cover each partitio
ence of the tester is used to anticipate what defects might be present in the component or system under test as a result of errors made, an
n defects to those already in the component or system for the purpose of monitoring the rate of detection and removal, and estimating the
ontinue normal operation despite the presence of erroneous inputs. [Afer IEEE 610].
ct result. [Afer IEEE 610]
ponse to erroneous input, from either a human user or from another component or system, or to an internal failure.
nslated into object code, and which will be executed procedurally when the program is running and may perform an action on data.
d by a test case when the input value causes the execution of that element, such as a statement, decision, or other structural element.
mprises all combinations of input values and preconditions.
, agreed upon with the stakeholders, for permitting a process to be officially completed. The purpose of exit criteria is to prevent a task fro

on, or another source, of the component or system under specified conditions.


the design of the tests as those tests are performed and uses information gained while testing to design new and better tests. [Bach]
does not match its expected result.
on and analysis of identifying possible modes of failure and attempting to prevent their occurrence.
of a failure. For example, a system in failure mode may be characterized by slow operation, incorrect outputs, or complete termination of e
ven category to a given unit of measure, e.g. failures per unit of time, failures per number of transactions, failures per number of compute
tem from its expected delivery, service or result. [Afer Fenton]
maintain a specified level of performance in cases of sofware faults (defects) or of infringement of its specified interface. [ISO 9126] See a
aults (defects).
d preconditions exists which causes it to be executed.
pecified or implied by requirements documentation (for example reliability, usability or design constraints). [Afer IEEE 1008]
nite number of states and transitions between those states, possibly with accompanying actions. [IEEE 610]
rocedures and requirements, e.g. inspection.
mended by a formal change control process. See also baseline.
e functionality of an information system. The measurement is independent of the technology. This measurement may be used as a basis fo
he components or systems for the purpose of getting a basic functionality working early. See also integration testing.
hat a component or system must perform. [IEEE 610]
ect test cases based on an analysis of the specification of the functionality of a component or system without reference to its internal struc
fication of the functionality of a component or system. See also black box testing.
unctionality of a sofware product.
provide functions which meet stated and implied needs when the sofware is used under specified conditions. [ISO 9126]

mine the compliance of a user interface with recognized usability principles (the so-called “heuristics”).
ation level) values for input data and expected results.
el through the layers of test documentation (e.g. test plan, test design specification, test case specification and test procedure specification
f development documentation, test documentation and components, in order to implement a given change to specified requirements.
atus tracking of incidents found during testing. They ofen have workflow-oriented facilities to track and control the allocation, correction a
taking action and disposing of incidents. It involves recording incidents, classifying them and identifying the impact. [Afer IEEE 1044]
occurs during the testing which requires investigation. [Afer IEEE 829]
equires investigation. [Afer IEEE 1008]
is broken into a series of increments, each of which delivers a portion of the functionality in the overal project requirements. The requirem
e integrated and tested one or some at a time, until all the components or systems are integrated and tested.
ourages the accomplishment of objective testing. [Afer DO-178b]
et of possible input values.
nted) procedure.
be selected.. See also domain.

onent or outside) that is read by a component.


mination of documents to detect defects, e.g. violations of development standards and non-conformance to higher level documentation. Th
a sofware product. See also portability testing.
be installed in a specified environment [ISO 9126]. See also portability.
dia, which guides the installer through the installation process. This may be a manual guide, step-by-step procedure, installation wizard, or
which leads the installer through the installation process. It normally runs the installation process, provides feedback on installation result
program in order to collect information about program behavior during execution.

de if the component or system is ready for detailed and further testing. An intake test is typically carried out at the start of the test executio
he interfaces and in the interactions between integrated components or systems. See also component integration testing, system integratio
systems into larger assemblies.
with testing the interfaces between components or systems.
nteroperability of a sofware product. See also functionality testing.
interact with one or more specified components or systems. [Afer ISO 9126] See also functionality.
rejected by the component or system. See also error tolerance.
tion from surrounding components, with surrounding components being simulated by stubs and drivers, if needed.
to contain not only test data and expected results, but also keywords related to the application being tested. The keywords are interpreted
t that have been exercised by a test suite. 100% LCSAJ coverage implies 100% decision coverage.
ch test cases are designed to execute LCSAJs.
sting of the following three items (conventionally identified by line numbers in a source code listing): the start of the linear sequence of exe
enable the user to learn its application. [ISO 9126] See also usability.
e behavior of a component or system with increasing load, e.g. number of parallel users and/or numbers of transactions to determine wha
n level) values for input data and expected results.
maintainability of a sofware product.
can be modified to correct defects, modified to meet new requirements, modified to make future maintenance easier, or adapted to a chan
tem or the impact of a changed environment to an operational system.
delivery to correct defects, to improve performance or other attributes, or to adapt the product to a modified environment. [IEEE 1219]
sition, supply, development, operation, or maintenance process, performed by or on behalf of management that monitors progress, determ
respect to the effectiveness and efficiency of its processes and work practices. See also Capability Maturity Model, Test Maturity Model. (2
ttribute of an entity by making a measurement [ISO 14598].
nalysis that can be performed on it. [ISO 14598]
egory to an entity to describe an attribute of that entity. [ISO 14598]
ocation logic that causes it to fail to reclaim memory afer it has finished using it, eventually causing the program to fail due to lack of mem
ed for measurement. [ISO 14598]
ed (intermediate) deliverables and results should be ready.
or an inspection or other review process.
un concurrently with the component or system under test and supervises, records and/or analyses the behavior of the component or syste
gle condition outcomes within one statement that have been exercised by a test suite. 100% multiple condition coverage implies 100% con
ch test cases are designed to execute combinations of single condition outcomes (within one statement).
ghness by measuring the extent to which a test suite can discriminate the program from slight variants (mutants) of the program.
t or system does not work. Negative testing is related to the testers’ attitude rather than a specific test approach or test design technique. [
t. [ISO 9000]
ctionality, but to attributes of such as reliability, efficiency, usability, maintainability and portability.
r nonfunctional testing.
system that do not relate to functionality, e.g. reliability, efficiency, usability, maintainability and portability.
sitions that have been exercised by a test suite. [Chow]
test cases are designed to execute all valid sequences of N+1 transitions. [Chow] See also state transition testing.
the general market, i.e. for a large number of customers, and that is delivered to many customers in identical format.
enable the user to operate and control it. [ISO 9126] See also usability.
d at users’ or customers’ sites where the component or system under test will be used. The sofware may include operating systems, databa
operations (short duration tasks) and their probability of typical use. [Musa]
ent or system in its operational environment. [IEEE 610]
an be selected. See also domain.

onent or outside) that is written by a component.


by lines of code (production and/or test) of a component are written by two programmers sitting at a single computer. This implicitly mean
. Typically, they share one computer and trade control of it while testing.
r a test item (function) or feature has passed or failed a test. [IEEE 829]
t matches its expected result.
exercised by a test suite. 100% path coverage implies 100% LCSAJ coverage.
e execution of a given path.
ch test cases are designed to execute paths.
tements, of a component or system from an entry point to an exit point.
r efficiency used to guide and control progressive development, e.g. Defect Detection Percentage (DDP) for testing. [CMMI]
d that usually has two main facilities: load generation and test transaction measurement. Load generation can simulate either multiple use
erformance of a sofware product. See efficiency testing.
ent accomplishes its designated functions within given constraints regarding processing time and throughput rate. [Afer IEEE 610] See effi

ortability of a sofware product.


t can be transferred from one hardware or sofware environment to another. [ISO 9126]
must be fulfilled afer the execution of a test or test procedure.
ts, performed afer the sofware has finished running.
must be fulfilled before the component or system can be executed with a particular test or test procedure.
ed to an item, e.g. defect.
h test cases are designed toexecute business procedures and processes. [TMap]
sform inputs into outputs. [ISO 12207]
ple test levels.
nd controlled activities with start and finish dates undertaken an objective conforming to specific requirements, including the constraints o
is in fact generated according to some prearranged sequence.
roviding confidence that quality requirements will be fulfilled. [ISO 9000]
item’s quality. [IEEE 610]
ol an organization with regard to quality. Direction and control with regard to quality generally includes the establishment of the quality po
m or process meets specified requirements and/or user/customer needs and expectations. [Afer IEEE 610]
test cases are selected, possibly using a pseudo-random generation algorithm, to match an operational profile. This technique can be used
ecoverability of a sofware product. See also reliability testing.
re-establish a specified level of performance and recover the data directly affected in case of failure. [ISO 9126] See also reliability.
lowing modification to ensure that defects have not been introduced or uncovered in unchanged areas of the sofware, as a result of the c
onfiguration, current status and other delivery information delivered by development to testing, and possibly other stakeholders, at the sta
eliability of a sofware product.
form its required functions under stated conditions for a specified period of time, or for a specified number of operations. [ISO 9126]
be used in place of another specified sofware product for the same purpose in the same environment. [ISO 9126] See also portability.
r to solve a problem or achieve an objective that must be met or possessed by a system or system component to satisfy a contract, standar
uirements, requirements attributes (e.g. priority, knowledge responsible) and annotation, and facilitates traceability through layers of requi
cle during which the equirements for a sofware product are defined and documented. [IEEE 610]
s are designed based on test objectives and test conditions derived from requirements, e.g. tests that exercise specific functions or probe n
esource-utilization of a sofware product.
use appropriate amounts and types of resources, for example the amounts of main and secondary memory used by the program and the s
tion of a test. It includes outputs to screens, changes to data, reports, and communication messages sent out. See also actual result, expect
ed when testing is re-started afer a suspension. [Afer IEEE 829]
e last time they were run, in order to verify the success of corrective actions.
us to ascertain discrepancies from planned results and to recommend improvements. Examples include management review, informal revi
all identify and describe anomalies in the product or project under review. Reviewers can be chosen to represent different viewpoints and
o estimate their impact and probability of occurrence (likelihood).
reached and protective measures are implemented for reducing risks to, or maintaining risks within, specified levels.
hniques such as brainstorming, checklists and failure history.
practices to the tasks of identifying, analyzing, prioritizing, and controlling risk.
ve consequences; usually expressed as impact and likelihood.
roviding information about product risks. [Afer Gerrard]
em can function correctly in the presence of invalid inputs or stressful environmental conditions. [IEEE 610] See also errortolerance, fault-t
onformance and possibly should be permanently eliminated through process improvement.
afety of a sofware product.
achieve acceptable levels of risk of harm to people, business, sofware, property or the environment in a specified context of use. [ISO 912
e sofware product.
be upgraded to accommodate increased loads. [Afer Gerrard]
t mentioned and any suggestions for improvement during a review meeting, on a logging form. The scribe has to make ensure that the log
able test scripts are written, used by a test execution tool (e.g. a capture/replay tool).
ofware product.
on its ability to prevent unauthorized access, whether accidental or deliberate, to programs and data. [ISO 9126]
n the development or operation of a component or system. [Afer IEEE 610]
l characteristics of one physical or abstract system by another system. [ISO 2382/1]
sed during testing, which behaves or operates like a given system when provided with a set of controlled inputs. [Afer IEEE 610, DO178b] S
s that cover the main functionality of a component or system, to ascertaining that the most crucial functions of a program work, but not bo
of a sofware product that bear on its ability to satisfy stated or implied needs. [Afer ISO 9126]
nique to evaluate the usability, e.g. user-satisfaction, of a component or system. [Veenendaal]
mplete, precise and verifiable manner, the requirements, design, behavior, or other characteristics of a component or system, and, ofen, th

cts a result.
avoid unexpected effects from modifications in the sofware. [ISO 9126] See also maintainability.
omponent or system can assume, and shows the events or circumstances that cause and/or result from a change from one state to anothe
or each state combined with each possible event, showing both valid and invalid transitions.
h test cases are designed to execute valid and invalid state transitions. See also N-switch testing.
ponent or system.
that have been exercised by a test suite.
ch test cases are designed toexecute statements.
ich is typically the smallest indivisible unit of execution.
ments or code, carried out without execution of these sofware artifacts.

out without execution of that sofware.


. The tool checks source code, for certain properties such as conformance to coding standards, quality metrics or data flow anomalies.
ification or implementation level without execution of that sofware, e.g. reviews or static code analysis.
of the statistical distribution of the input is used to construct representative test cases. See also operational profile testing.
t, consisting of the recording andreporting of information needed to manage a configuration effectively. This information includes a listing
r component at or beyond the limits of its specified requirements. [IEEE 610]
structure of the component.

tion of a sofware component, used to develop or test a component that calls or is otherwise dependent on it. It replaces a called compon
hin a component.
provide an appropriate set of functions for specified tasks and user objectives. [ISO 9126] See also functionality.
or a portion of the testing activities on the test items. [Afer IEEE 829]
h test cases are designed based upon the definition of the input domain and/or output domain.
ckages; testing interfaces to external organizations (e.g. Electronic Data Interchange, Internet).
m to verify that it meets specified requirements. [Hetzel]
accomplish a specific function or set of functions. [IEEE 610]
ses on achieving consensus on the technical approach to be taken. A technical review is also known as a peer review. [Gilb and Graham, IEE
or a specific project. It typically includes the decisions made that follow based on the (test) project’s goal and the risk assessment carried o
t test activities, e.g. test management, test design, test execution and results checking.
nts of a component or system can be inferred. The documentation on which the test cases are based. If a document can be amended only
(objective, inputs, test actions, expected results, and execution preconditions) for a test item. [Afer IEEE 829]
tions, expected results and execution postconditions, developed for a particular objective or test condition, such as to exercise a particular
bly test ideas. Test charters are amongst other used in exploratory testing. See also exploratory testing.

ween the actual results produced by the component or system under test and the expected results for a test. Test comparison can be perfo
m that could be verified by one or more test cases, e.g. a function, transaction, quality attribute, or structural element.
e selected from existing databases or created, generated, manipulated and edited for use in testing.
se) before a test is executed, and thataffects or is affected by the component or system under test.
s (coverage items) for a test item, the detailed test approach and identifying the associated high level test cases. [Afer IEEE 829]

y by generating test inputs from a specification that may be held in a CASE tool repository, e.g. requirements management tool, or from sp
trumentation, simulators, sofware tools, and other support elements needed to conduct a test. [Afer IEEE 610]
est process summarizing all testing activities and results. It also contains an evaluation of the test process and lessons learned.
k tools, to control the execution of tests, the comparison of actual results to expected results, the setting up of test preconditions, and oth
ment life cycle during which the components of a sofware product are executed, and the sofware product is evaluated to determine whet
dures. The test procedures are included in the test execution schedule in their context and in the order in which they are to be executed.
est execution, either manually or automated.
other sofware using an automated test script, e.g. capture/playback. [Fewster and Graham]
ponent or system under test, producing actual result(s).
nd drivers needed to conduct a test.
rform testing, consisting of test environments, test tools, office environment and procedures.
e usually is one test object and many test items. See also test object.
ed and managed together. A test level is linked to the responsibilities in a project. Examples of test levels are component test, integration te
about the execution of tests. [IEEE 829]
ut tests executed into a test log.
control of test activities, typically carried out by a test manager.
aluating a test object. The individual, who directs, controls, administers plans and regulates the evaluation of a test object.
cess improvement, related to the Capability Maturity Model (CMM) that describes the key elements of an effective test process.
ee also test item.
ecuting a test.
o compare with the actual result of the sofware under test. An oracle may be the existing system (for a benchmark), a user manual, or an i
to what extent a certain target value or criterion is met. Ofen related to test process improvement objectives, e.g. Defect Detection Percen
to a manageable phase of a project, e.g. the execution activities of a test level. [Afer Gerrard]
ach, resources and schedule of intended test activities. It identifies amongst others test items, the features to be tested, the testing tasks, w

based on function point analysis. [TMap]


nciples, approach and major objectives of the organization regarding testing.
tions for the execution of a test. Also known as test script or manual test script. [Afer IEEE 829]

improvement that describes the key elements of an effective test process, especially targeted at system testing and acceptance testing.
planning, specification, execution, recording and checking for completion. [BS 7925/2]
he same results are produced each time the test is executed.
f the test object.
ure specification, especially an automated one.
specification, test case specification and/or test procedure specification.
evels to be performed and the testing within those levels for a programme (one or more projects).
nt or system under test, where the post condition of one test is ofen used as the precondition for the next one.
s and results. It also contains an evaluation of the corresponding test items against exit criteria. [Afer IEEE 829]

more test activities, such as planning and control, specification, building initial files and data, test execution and test analysis. [TMap] See a
a component or system regarding one or more interrelated quality attributes. A test type is focused on a specific test objective, i.e. reliabili
mine whether the test basis is at an adequate quality level to act as an input document for the test process. [Afer TMap]
enable modified sofware to be tested. [ISO 9126] See also maintainability.
ted in terms that permit establishment of test designs (and subsequently test cases) and execution of tests to determine whether the requi
nvolved in the testing of a component or system.
vities, both static and dynamic, concerned with planning, preparation and evaluation of sofware products and related work products to de
s required to plan, design, and execute tests, such as documentation, scripts, inputs, expected results, set-up and clear-up procedures, files
ng where the progressive integration of components follows the implementation of subsets of the requirements, as opposed to the integrati
esting where the component at the top of the component hierarchy is tested first, with lower level components being simulated by stubs. T
cumentation and sofware, such as requirements with associated tests. See also horizontal traceability, vertical traceability.
rocess (e.g. data) can be traced back through the process, taking the process output as a starting point. This facilitates defect analysis and a
enable the user to understand whether the sofware is suitable, and how it can be used for particular tasks and conditions of use. [ISO 912
re is impossible to execute.
the sofware product is understood, easy to learn, easy to operate and attractive to the users under specified conditions. [Afer ISO 9126]
rstood, learned, used and attractive to the user when used under specified conditions. [ISO 9126]
h test cases are designed to execute user scenarios.
d to evaluate the usability of a component or system.
h provision of objective evidence that the requirements for a specific intended use or application have been fulfilled. [ISO 9000]
is accessible by a sofware program by referring to it by a name.
h the provision of objective evidence that specified requirements have been fulfilled. [ISO 9000]
ayers of development documentation to components.
velopment life cycle activities from requirements specification to maintenance. The V-model illustrates how testing activities can be integra
arge volumes of data. See also resource-utilization testing.
r of a document in order to gather information and to establish a common understanding of its content. [Freedman and Weinberg, IEEE 10
ect test cases based on an analysis of the internal structure of a component or system.
al structure of the component or system.
e that aims at making an accurate estimation using the collective wisdom of the team members.
cess, plan or other deliverable is complete, accurate, reliable and meets its specified requirements. Acceptance is usually preceded by chan
ble for allowing users to make use of IT services, data or other assets. Access management helps to protect the confidentiality, integrity and
ar to that of the business relationship manager, but includes more commercial aspects. Most commonly used by type III service providers w
e for identifying the actual costs of delivering IT services, comparing these with budgeted costs, and managing variance from the budget.
or example, an accredited body may be authorized to provide training or to conduct audits.
guration item or an IT service that uses automated regular checks to discover the current status. See also passive monitoring
ticular result. Activities are usually defined as part of processes or plans, and are documented in procedures.
ours, commonly used in formal calculations of availability. See also downtime.
erstanding between two or more parties. An agreement is not legally binding, unless it forms part of a contract. See also
hreshold has been reached, something has changed, or a failure has occurred. Alerts are ofen created and managed by system manageme
e Design) (Service Strategy) A technique that uses mathematical models to predict the behaviour of IT services or other configuration items
re required by an IT service. Each application may be part of more than one IT service. An application runs on one or more servers or client
function responsible for managing applications throughout their lifecycle.
document used to manage applications throughout their lifecycle. The application portolio contains key attributes of all applications. The
der that provides IT services using applications running at the service provider’s premises. Users access the applications by network conne
for understanding the resource requirements needed to support a new application, or a major change to an existing application. Applicatio
m or IT service, including the relationships of components to each other and to the environment they are in. Architecture also includes the s
CI) that is made up of a number of other CIs. For example, a server CI may contain CIs for CPUs, disks, memory etc.; an IT service CI may co
a standard or set of guidelines is being followed, that records are accurate, or that efficiency and effectiveness targets are being met.
lity. The assets of a service provider include anything that could contribute to the delivery of a service. Assets can be one of the following t
rocess responsible for tracking and reporting the value and ownership of assets throughout their lifecycle. See also service asset and confi
hat includes their ownership and value. See also fixed asset management.
of an asset that make it particularly useful for a given purpose. Asset specificity may limit the use of the asset for other purposes.
n about a configuration item. Examples are name, location, version number and cost. Attributes of CIs are recorded in the configuration ma
ck whether a standard or set of guidelines is being followed, that records are accurate, or that efficiency and effectiveness targets are being

chnology to direct an incoming telephone call to the most appropriate person in the shortest possible time. ACD is sometimes called autom
other configuration item to perform its agreed function when required. Availability is determined by reliability, maintainability, serviceabil
for defining, analysing, planning, measuring and improving all aspects of the availability of IT services. Availability management is responsi
nformation that are used to support availability management. See also service knowledge management system.
sting and future availability requirements for IT services can be provided cost-effectively.
es a service or other configuration item to a previous baseline. Back-out is used as a form of remediation when a change or release is not s
ing data to protect against loss of integrity or availability of the original.
gement tool developed by Drs Robert Kaplan (Harvard Business School) and David Norton. A balanced scorecard enables a strategy to be b
Transition) A snapshot that is used as a reference point. Many snapshots may be taken and recorded over time but only some will be used
ne that is used to compare related data sets as part of a benchmarking exercise. For example, a recent snapshot of a process can be compa
ique that compares a benchmark with related data sets such as a more recent snapshot, industry data, or best practice. The term is also us
een successfully used by multiple organizations. ITIL is an example of best practice.
chnique that helps a team to generate ideas. Ideas are not reviewed during the brainstorming session, but at a later stage. Brainstorming is
ble for creating and maintaining British standards. See www.bsi-global.com for more information. See also International Orga
business unit plans to receive, and plans to pay out, over a specified period of time. See also budgeting; planning.
the spending of money. Budgeting consists of a periodic negotiation cycle to set future budgets (usually annual) and the day-to-day monito
bling a number of configuration items to create part of an IT service. The term is also used to refer to a release that is authorized for distrib
ment where applications, IT services and other builds are assembled prior to being moved into a test or live environment.
tity or organization formed of a number of business units. In the context of ITSM, the term includes public sector and not-for-profit organiz
usiness capacity management is the sub-process of capacity management responsible for understanding future business requirements for
cant item of expenditure. The business case includes information about costs, benefits, options, issues, risks and possible problems.
ponsible for managing risks that could seriously affect the business. Business continuity management safeguards the interests of key stake
required to restore business processes following a disruption. The plan will also identify the triggers for invocation, people to be involved,
t or a service from the business. For example, if the business is a car manufacturer, then the business customer is someone who buys a car.
is is the activity in business continuity management that identifies vital business functions and their dependencies. These dependencies m
ness process, or of the business as a whole. Business objectives support the business vision, provide guidance for the IT strategy, and are of
on, monitoring and management of business processes.
erstanding of the service provider and IT services from the point of view of the business, and an understanding of the business from the po
by the business. A business process contributes to the delivery of a product or service to a business customer. For example, a retailer may h
e for maintaining a positive relationship with the business (customers). Business relationship management identifies customer needs and e
maintaining the relationship with one or more customers. This role is ofen combined with the service level manager role.
tomers by business units. For example, delivery of financial services to customers of a bank, or goods to the customers of a retail store. Su
livered to business customers.
ess that has its own plans, metrics, income and costs. Each business unit owns assets and uses these to create value for customers in the fo
e service desk from a user. A call could result in an incident or a service request being logged.
siness unit that handles large numbers of incoming and outgoing telephone calls. See also service desk.
d to distinguish incoming requests to a service desk. Common call types are incident, service request and complaint.
zation, person, process, application, IT service or other configuration item to carry out an activity. Capabilities are intangible assets of an or
ity maturity model® integration (CMMI) is a process improvement approach developed by the Sofware Engineering Institute (SEI) of Carne
ut that a configuration item or IT service can deliver. For some types of CI, capacity may be the size or volume, for example a disk drive.
for ensuring that the capacity of IT services and the IT infrastructure is able to deliver agreed service level targets in a cost-effective and tim
nformation that are used to support capacity management. See also service knowledge management system.
o manage the resources required to deliver IT services. The plan contains details of current and historic usage of IT services and component
ity management responsible for creating a capacity plan.
something that will become a financial asset – for example, computer equipment and buildings. The value of the asset is depreciated over
est to financial management because it is above an agreed financial value.
as capital, even though no asset is purchased. This is done to spread the impact of the cost over multiple accounting periods. The most com
thing in common. Categories are used to group similar things together. For example, cost types are used to group similar types of cost. Incid
e to a standard. Certification includes a formal audit by an independent and accredited body. The term is also used to mean awarding a cer
ation or removal of anything that could have an effect on IT services. The scope should include changes to all architectures, processes, tool
at support the assessment, prioritization, authorization and scheduling of changes. A change advisory board is usually made up of represen
ble for formal assessment of a new or changed IT service to ensure that risks have been managed and to help determine whether to autho
changes made to a configuration item during its life. Change history consists of all those change records that apply to the CI.
ble for controlling the lifecycle of all changes. The primary objective of change management is to enable beneficial changes to be made, wi
ealing with a particular category of change. A change model defines specific agreed steps that will be followed for a change of this categor
ocument that includes a high level description of a potential service introduction or significant change, along with a corresponding busines
he details of a change. Each change record documents the lifecycle of a single change. A change record is created for every request for chan

all authorized changes and their planned implementation dates, as well as the estimated dates of longer term changes. A change schedule
e when changes or releases may be implemented with minimal impact on services. Change windows are usually documented in service lev
IT services. Charging for IT services is optional, and many organizations choose to treat their IT service provider as a cost centre.
ument that contains details of a new or changed service. New service introductions and significant service changes are documented in a ch
help identify possible causes of problems. All available data about the problem is collected and sorted by date and time to provide a detaile
d to classify configuration items. The CI type identifies the required attributes and relationships for a configuration record. Common CI type
ing. Classification is used to ensure consistent management and reporting. Configuration items, incidents, problems, changes etc. are usua
e business or a business customer. For example, client manager may be used as a synonym for business relationship manager. The term is
lifecycle of an incident, problem, change etc. When the status is closed, no further action is taken.
he status of an incident, problem, change etc. to closed.
OBjectives for Information and related Technology (COBIT) provides guidance and best practice for the management of IT processes. COBI
a standards organization, such as ISO or BSI. Many standards consist of a code of practice and a specification. The code of practice describ

ofware or middleware that can be purchased from a third party.


nes is followed, or that proper, consistent accounting or other practices are being employed.
part of something more complex. For example, a computer system may be a component of an IT service; an application may be a compone
e Design) The sub-process of capacity management responsible for understanding the capacity, utilization, and performance of configuratio
hat is part of an assembly. For example, a CPU or memory CI may be part of a server CI.
o identify the impact of configuration item failure on IT services and the business. A matrix is created with IT services on one axis and CIs on
integration is a general term covering any kind of integration between computers and telephone systems. It is most commonly used to refe
ed in the same operation at the same time.
requires that data should only be accessed by authorized people.
to describe a group of configuration items that work together to deliver an IT service, or a recognizable part of an IT service. Configuration
figuration that has been formally agreed and is managed through the change management process. A configuration baseline is used as a ba
le for ensuring that adding, modifying or removing a configuration item is properly managed – for example, by submitting a request for cha
le for collecting information about configuration items and their relationships, and loading this information into the configuration managem
her service asset that needs to be managed in order to deliver an IT service. Information about each configuration item is recorded in a con
ble for maintaining information about configuration items required to deliver an IT service, including their relationships. This information is
ore configuration records throughout their lifecycle. The configuration management system maintains one or more configuration managem
d information that are used to support service asset and configuration management. The configuration management system is part of an o
he details of a configuration item. Each configuration record documents the lifecycle of a single configuration item. Configuration records ar
her relationships between all the configuration items that comprise a configuration.
in the lifecycle of an IT service and the title of one of the core ITIL publications. Continual service improvement is responsible for managing
o achieve 100% availability. A continuously available IT service has no planned or unplanned downtime.
o eliminate planned downtime of an IT service. Note that individual configuration items may be down even though the IT service is availabl
o or more parties.
t a business objective is achieved or that a process is followed. Examples of control include policies, procedures, roles, RAID, door locks etc

nagement of IT services, processes, functions, assets etc. There can be several different control perspectives on the same IT service, proces
ludes change management and configuration management.
ers basic outcomes desired by one or more customers. See also core service package; supporting service.
of a core service that may be shared by two or more service level packages. See also service package.
activity, IT service or business unit. Costs consist of real cost (money), notional cost (such as people’s time) and depreciation.
he costs and the benefits involved in one or more alternative courses of action. See also business case; internal rate of
ect to which costs are assigned. A cost centre does not charge for services provided. An IT service provider can be run as a cost centre or a p
egory to which costs are assigned in budgeting and accounting. The highest-level category is cost type. For example, a cost type of ‘people’
sed to refer to budgeting and accounting, and is sometimes used as a synonym for financial management.
egory to which costs are assigned in budgeting and accounting – for example, hardware, sofware, people, accommodation, external and tr
gory to which costs are assigned, cost units are usually things that can be easily counted (e.g. staff numbers, sofware licences) or things ea
ffectiveness and cost of a service, process or activity. A cost-effective process is one that achieves its objectives at minimum cost.
ol. The term is most ofen used when referring to measures that increase resilience, fault tolerance or reliability of an IT service.
as already started to ensure that it will meet its objectives. Course corrections are made as a result of monitoring progress.
d managing risks. CRAMM was developed by the UK government, but is now privately owned. See www.cramm.com for further information
sible for managing the wider implications of business continuity. A crisis management team is responsible for strategic issues such as mana
ice, process, plan, project or other activity is to succeed. Key performance indicators are used to measure the achievement of each critical
ase or structured document used to record and manage improvement opportunities throughout their lifecycle.
of people, including expectations about how people should behave, their ideas, beliefs and practices. See also vision.
e customer of an IT service provider is the person or group who defines and agrees the service level targets. The term is also sometimes in
ed document used to manage service contracts or agreements between an IT service provider and its customers. Each IT service delivered t
le to the customer. These are normally services that support the customer’s business processes and facilitate one or more outcomes desire
ed document used to record all customers of the IT service provider. The customer portolio is the business relationship manager’s view of t
ation of overall IT service performance and availability. Dashboard images may be updated in real time, and can also be included in manag
between data, information, knowledge and wisdom. DIKW shows how each of these builds on the others.
s in which the definitive and authorized versions of all sofware configuration items are securely stored. The definitive media library may al
t a commitment in a service level agreement or a contract. It is also used in a more informal way to mean a planned output of any process
customer demand for services and the provision of capacity to meet these demands. At a strategic level, demand management can involve

cess or activity on another.


le for movement of new or changed hardware, sofware, documentation, process etc. to the live environment. Deployment is part of the r
ction in value of an asset over its life. This is based on wearing out, consumption or other reduction in the useful economic value.
at identifies requirements and then defines a solution that is able to meet these requirements. See also service design.
for coordinating all service design activities, processes, and resources. Design coordination ensures the consistent and effective design of n
t lifecycle. Detection results in the incident becoming known to the service provider. Detection can be automatic or the result of a user log
for creating or modifying an IT service or application ready for subsequent release and deployment. This process is not described in detail w
create or modify IT services or applications. Development environments are not typically subjected to the same degree of control as test o
t and problem lifecycles. The purpose of diagnosis is to identify a workaround for an incident or the root cause of a problem.
uestions used by service desk staff to ensure they ask the correct questions, and to help them classify, resolve and assign incidents. Diagnos
nagement by charging different amounts for the same function of an IT service under different circumstances. For example, reduced charg
n IT service which can be allocated in full to a specific customer, cost centre, project etc. For example, the cost of providing non-shared serv
anages information about IT infrastructure available on a network, and corresponding user access rights.
nt may be paper or electronic – for example, a policy statement, service level agreement, incident record or diagram of a computer room la
time when an IT service or other configuration item is not available during its agreed service time. The availability of an IT service is ofen c
tives or requirements – for example, new legislation or the actions of competitors.
lifecycle at the end of deployment and before the service is fully accepted into operation. During early life support, the service provider re
ge cost that is possible from increasing the usage of an IT service or asset. See also economies of scope.
hat is allocated to an IT service by using an existing asset for an additional purpose. For example, delivering a new IT service from an existin
ure of whether the objectives of a process, service or activity have been achieved. An effective process or activity is one that achieves its ag
ure of whether the right amount of resource has been used to deliver a process, service or activity. An efficient process achieves its objecti
e introduced as soon as possible – for example, to resolve a major incident or implement a security patch. The change management proces
ange Advisory Board that makes decisions about high-impact emergency changes. Membership may be decided at the time a meeting is ca
astructure that is used for a particular purpose – for example, live environment, test environment, build environment. Also used in the term
unction that causes a failure of one or more IT services or other configuration items. A mistake made by a person or a faulty process that im
ns additional resources when these are needed to meet service level targets or customer expectations. Escalation may be needed within an
ganizations in their analysis and decision-making on service sourcing models and strategies. It was developed by Carnegie Mellon Universit
service providers develop their IT service management capabilities from a service sourcing perspective. It was developed by Carnegie Mell
oximate value for a metric or cost. Estimation is also used in capacity and availability management as the cheapest and least accurate mod
t has significance for the management of an IT service or other configuration item. The term is also used to mean an alert or notification cr
ble for managing events throughout their lifecycle. Event management is one of the main activities of IT operations.
more key performance indicators or other important targets that have exceeded defined thresholds. Examples include service level agreem
ent. The stages are detection, diagnosis, repair, recovery and restoration. The expanded incident lifecycle is used to help understand all con
iness from the IT service provider. See also external service provider; internal customer.
very of IT service to a customer. External metrics are usually defined in service level agreements and reported to customers.
hat is part of a different organization from its customer. An IT service provider may have both internal and external customers.

ible for managing the physical environment where the IT infrastructure is located. Facilities management includes all aspects of managing t
ate to specification, or to deliver the required output. The term may be used when referring to IT services, processes, activities, configurati
mpact of failures. It involves analysing what would happen afer failure of each configuration item, all the way up to the effect on the busine
also known as hot standby. Fast recovery normally uses a dedicated fixed facility with computer systems and sofware configured ready to

e or other configuration item to continue to operate correctly afer failure of a component part. See also countermeasure; r
e Design) A technique that can be used to determine a chain of events that have caused an incident, or may cause an incident in the future.
sses responsible for managing an IT service provider’s budgeting, accounting and charging requirements.
rarchy of support groups involved in the resolution of incidents. Each level contains more specialist skills, or has more time or other resourc

ess, configuration item, IT service etc. that is capable of meeting its objectives or service levels. Being fit for purpose requires suitable desig
business that has a long term useful life. For example a building, a piece of land, a server, or a sofware license. See also service asset; confi
ble for tracking and reporting the value and ownership of fixed assets throughout their lifecycle. Fixed asset management maintains the ass
ry with IT service usage – for example, the cost of server hardware. See also variable cost.
vailable for use when needed by an IT service continuity plan. See alsoportable facility; recovery option.
sing service desks and support groups around the world to provide seamless 24/7 service. Calls, incidents, problems and service requests a
equirement – for example, by providing a new IT service, or meeting a service request.
they use to carry out one or more processes or activities – for example, the service desk. The term also has two other meanings:
nt, problem or change to a technical team with a higher level of expertise to assist in an escalation.
vity that compares two sets of data and identifies the differences. Gap analysis is commonly used to compare a set of requirements with ac
tually implemented, and that required processes are correctly followed. Governance includes defining roles and responsibilities, measuring
also known as cold standby. Gradual recovery typically uses a portable or fixed facility that has environmental support and network cabling
ch recommends what should be done. Compliance with a guideline is not normally enforced. See also standard.
users to log incidents. A help desk is usually more technically focused than a service desk and does not provide a single point of contact fo
g more senior levels of management to assist in an escalation.
hat minimizes or hides the effects of configuration item failure from the users of an IT service. High availability solutions are designed to ach

s used to identify a user, person or role. The identity is used to grant rights to that user, person or role. Example identities might be the use
also known as hot standby. Provision is made to recover the IT service with no loss of service. Immediate recovery typically uses mirroring
measure of the effect of an incident, problem or change on business processes. Impact is ofen based on how service levels will be affecte
ption to an IT service or reduction in the quality of an IT service. Failure of a configuration item that has not yet affected service is also an i
ble for managing the lifecycle of all incidents. The primary objective of incident management is to return the IT service to customers as qui
he details of an incident. Each incident record documents the lifecycle of a single incident.
n IT service which cannot be allocated in full to a specific customer – for example, the cost of providing shared servers or sofware licences
s the confidentiality, integrity and availability of an organization’s assets, information, data and IT services. Information security manageme
processes, functions, standards, guidelines and tools that ensures an organization can achieve its information security management objec
he organization’s approach to information security management.
mmunication or processing of information. The technology typically includes computers, telecommunications, applications and other sofw
s hardware, network or other data centre components. The term is also used as a synonym for supporting service.

ensures data and configuration items are modified only by authorized personnel and activities. Integrity considers all possible causes of mo
call distribution that accepts user input, such as key presses and spoken commands, to identify the correct destination for incoming calls.
also known as warm standby. Intermediate recovery usually uses a shared portable or fixed facility that has computer systems and networ
ness as the IT service provider. See also external customer; internal service provider.
provider to monitor the efficiency, effectiveness or cost-effectiveness of the IT service provider’s internal processes. Internal metrics are n
lp make decisions about capital expenditure. It calculates a figure that allows two or more alternative investments to be compared. A large
hat is part of the same organization as its customer. An IT service provider may have both internal and external customers.
e provider to manage IT services. See also service sourcing; Type I service provider; Type II service prov
rdization (ISO) is the world’s largest developer of standards. ISO is a non-governmental organization that is a network of the national stand

s access to the internet. Most ISPs also provide other IT services such as web hosting.
fined in a plan – for example, initiating the IT service continuity plan for one or more IT services.
e Operation) A technique that helps a team to identify all the possible causes of a problem. Originally devised by Kaoru Ishikawa, the outpu
international standards and guidelines for quality management systems. See www.iso.org for more information. See also
agement systems. See also ISO 9000; standard.
e of practice for information security management. See also standard.
IT service management. ISO/IEC 20000 is aligned with ITIL best practice.
e Design) ISO specification for information security management. The corresponding code of practice is ISO/IEC 17799.
management within a service provider, charged with developing and delivering IT services. Most commonly used in UK government depart
acilities etc. that are required to develop, test, deliver, monitor, control or support applications and IT services. The term includes all of the
ice management. ITIL is owned by AXELOS and consists of a series of publications giving guidance on the provision of quality IT services, an
by IT operations control, including console management, job scheduling, backup and restore, and print and output management. IT operati
ible for monitoring and control of the IT services and IT infrastructure. See also operations bridge.
n IT service provider that performs the daily activities needed to manage IT services and the supporting IT infrastructure. IT operations ma
er. An IT service is made up of a combination of information technology, people and processes. A customer-facing IT service directly suppo
for managing risks that could seriously affect IT services. IT service continuity management ensures that the IT service provider can always
required to recover one or more IT services. The plan will also identify the triggers for invocation, people to be involved, communications
quality IT services that meet the needs of the business. IT service management is performed by IT service providers through an appropriat
ndependent organization dedicated to promoting a professional approach to IT service management. The itSMF is a not-for-profit member
provides IT services to internal or external customers.
uring that business and IT service provider strategies and plans are closely aligned. An IT Steering Group includes senior representatives fro
nsibilities, skills and knowledge required by a particular person. One job description can include multiple roles – for example, the roles of c
ng the execution of sofware tasks that are required as part of an IT service. Job scheduling is carried out by IT operations management, an
Noriaki Kano that is used to help understand customer preferences. The Kano model considers attributes of an IT service grouped into area
e Operation) A structured approach to problem solving. The problem is analysed in terms of what, where, when and extent. Possible causes
e Design) A metric that is used to help manage an IT service, process, plan, project or other activity. Key performance indicators are used to
ntaining data used by the service knowledge management system.
ble for sharing perspectives, ideas, experience and information, and for ensuring that these are available in the right place and at the right ti
documented root cause and a workaround. Known errors are created and managed throughout their lifecycle by problem management. Kn
g all known error records. This database is created by problem management and used by incident and problem management. The known e
he details of a known error. Each known error record documents the lifecycle of a known error, including the status, root cause and workaro
ice, configuration item, incident, problem, change etc. The lifecycle defines the categories for status and the status transitions that are perm
rting service that has multiple service level packages. A line of service is managed by a service owner and each service level package is des
e or other configuration item that is being used to deliver service to a customer.
ment containing live configuration items used to deliver IT services to customers.
ffectively an IT service or other component can be managed.
y and effectively an IT service or other configuration item can be restored to normal working afer a failure. Maintainability is ofen measur
of impact for an incident. A major incident results in significant disruption to the business.
vices that emphasizes the fact that they are managed. The term is also used as a synonym for outsourced IT services.
on making by managers. Management information is ofen generated automatically by tools supporting the various IT service managemen
s. It includes all the activities required to identify and control the exposure to risk, which may have an impact on the achievement of an org
tions, standards, guidelines and tools that ensures an organization or part of an organization can achieve its objectives. This term is also wit
vention. Manual workaround is also used as the name of a recovery option in which the business process operates without the use of IT se
se in the cost of producing one more, or one less, unit of output – for example, the cost of supporting an additional user.
n IT service provider could exploit to meet the business needs of customers. The market space identifies the possible IT services that an IT
ure of the reliability, efficiency and effectiveness of a process, function, organization etc. The most mature processes and functions are form
as the Carnegie Mellon capability maturity model integration.
nd reporting reliability. MTBF is the average time that an IT service or other configuration item can perform its agreed function without int
ring and reporting reliability. It is the mean time from when a system or IT service fails, until it next fails. MTBSI is equal to MTBF plus MTRS
rvice or other configuration item afer a failure. MTTR is measured from when the configuration item fails until it is repaired. MTTR does no
ervice or other configuration item afer a failure. MTRS is measured from when the configuration item fails until it is fully restored and deliv
ing that is measured and reported to help manage a process, IT service or activity. See also key performance indicator.
wo or more sofware components or applications. Middleware is usually purchased from a supplier, rather than developed within the IT se
is a short but complete description of the overall purpose and intentions of that organization. It states what is to be achieved, but not how
service, configuration item etc. that is used to help understand or predict future behaviour.
ture behaviour of a system, process, IT service, configuration item etc. Modelling is commonly used in financial management, capacity man
ut of a task, process, IT service or other configuration item; comparing this output to a predefined norm; and taking appropriate action base
n of a configuration item, IT service or process to detect events and to ensure that the current status is known.
om a country near the country where the customer is based. This can be the provision of an IT service, or of supporting functions such as a
lp make decisions about capital expenditure. It compares cash inflows with cash outlows. Positive net present value indicates that an inves
n emergency change or a standard change. Normal changes follow the defined steps of the change managment process.
where services and configuration items are performing within their agreed service and operational levels.
g for IT services. Charges to customers are calculated and customers are informed of the charge, but no money is actually transferred. Noti
ctivity or organization in order to ensure that its purpose will be fulfilled. Objectives are usually expressed as measurable targets. The term

t supports the delivery of the government’s procurement agenda through its work in collaborative procurement and in raising levels of pro
om a location outside the country where the customer is based, ofen in a different continent. This can be the provision of an IT service, or
om a location within the country where the customer is based. See alsonear-shore; off-shore.
figuration item is said to operate if it is delivering the required outputs. Operate also means to perform one or more operations. For examp
ent of an IT service, system or other configuration item. Operation is also used to mean any predefined activity or transaction – for exampl
d delivery (strategic, tactical, operational). Operational activities include the day-to-day or short-term planning or delivery of a business pro
vices, which ofen involves repeating payments – for example, staff costs, hardware maintenance and electricity (also known as current exp
e Design) An agreement between an IT service provider and another part of the same organization. It supports the IT service provider’s deli
here IT services and IT infrastructure are monitored and managed.

eciding between investment choices. Opportunity cost represents the revenue that would have been generated by using the resources in a
er to obtain the maximum efficiency and effectiveness from a process, configuration item, application etc.
n. The term is sometimes used to refer to any entity that has people, resources and budgets – for example, a project or business unit.
owing a process, or delivering an IT service etc. The term is used to refer to intended results, as well as to actual results.
ce provider to manage IT services. See also service sourcing; Type III service provider.

help identify the business impact of one or more problems. A formula is used to calculate pain value based on the number of users affected
prioritize activities. The pareto principle says that 80% of the value of any activity is created with 20% of the effort. Pareto analysis is also us
s that involves working closely together for common goals or mutual benefit. The IT service provider should have a partnership with the bu
guration item, an IT service or a process that relies on an alert or notification to discover the current status. See also
ne or more business activities. Patterns of business activity are used to help the IT service provider understand and plan for different levels
a component is busy over a given period of time. For example, if a central processing unit is busy for 1,800 seconds in a one-hour period, i
ed by a system, person, team, process or IT service.
ational culture that integrates, and actively manages, leadership and strategy, people development, technology enablement, performance
cess responsible for day-to-day capacity management activities. These include monitoring, threshold detection, performance analysis and
of an IT service, a release or a process to the live environment. A pilot is used to reduce risk and to gain user feedback and acceptance. Se
tivities and resources needed to achieve an objective – for example, a plan to implement a new IT service or process. ISO/IEC 20000 require
tage cycle for process management, attributed to Edward Deming. Plan–Do–Check–Act is also called the Deming Cycle.
service will not be available. Planned downtime is ofen used for maintenance, upgrades and testing. See also change window
r more plans – for example, capacity planning.
ctations and intentions. Policies are used to direct decisions, and to ensure consistent and appropriate development and implementation o
or a large vehicle, provided by a third party and moved to a site when needed according to an IT service continuity plan.
or a project has been implemented. It determines if the change or project was successful, and identifies opportunities for improvement.
must be done. Practices can include activities, processes, functions, standards and guidelines. See also best practice.
r a condition that needs to be met, to enable successful implementation of a plan or process. It is ofen an output from one process that is
r establishing how much customers will be charged.
gy for project management. See www.ogc.gov.uk/prince2 for more information. See also Project Management Body of
category used to identify the relative importance of an incident, problem or change. Priority is based on impact and urgency, and is used t
s for patterns of events to predict possible future failures. See alsoreactive monitoring.
e Operation) Part of the problem management process. The objective of proactive problem management is to identify problems that might
re incidents. The cause is not usually known at the time a problem record is created, and the problem management process is responsible
ble for managing the lifecycle of all problems. The primary objectives of problem management are to prevent incidents from happening, an
he details of a problem. Each problem record documents the lifecycle of a single problem.
how to achieve an activity. Procedures are defined as part of processes. See also work instruction.
accomplish a specific objective. A process takes one or more defined inputs and turns them into defined outputs. It may include any of the
process, with the objective of performing the process in an effective, efficient and consistent manner.
nagement of a process. The process manager’s responsibilities include planning and coordination of all activities required to carry out, mon
ocess is fit for purpose. The process owner’s responsibilities include sponsorship, design, change management and continual improvement

arges for services provided. A profit centre can be created with the objective of making a profit, recovering costs, or running at a loss. An IT
ning sample data that will be replaced with real values when these are available.
re planned and managed together to achieve an overall set of related objectives and other outcomes.
nd other assets, that is required to achieve an objective or other outcome. Each project has a lifecycle that typically includes initiation, plan
ned and published by the Project Management Institute. See www.pmi.org for more information. See also PRINCE2.
ntifies the effect of planned changes, maintenance activities and test plans on agreed service levels.

es that the IT infrastructure is appropriate and correctly configured to support an application or IT service. See also
s to provide the intended value. For example, a hardware component can be considered to be of high quality if it performs as expected an
ble for ensuring that the quality of a service, process, or other service asset will provide its intended value. Quality assurance is also ofen u
mework of policy, processes, functions, standards, guidelines and tools that ensures an organization is of a suitable quality to reliably meet
rovement activity that is expected to provide a return on investment in a short period of time with relatively small cost and effort.
e Design) A model used to help define roles and responsibilities. RACI stands for responsible, accountable, consulted and informed.
s place in response to an event. For example, submitting a batch job when the previous job completes, or logging an incident when an erro
reement between two organizations to share resources in an emergency – for example, high-speed printing facilities or computer room spa
er output from a process or activity. Records are evidence of the fact that an activity took place and may be paper or electronic – for exam
rning a configuration item or an IT service to a working state. Recovery of an IT service ofen includes recovering data to a known consisten
g to an interruption to service. Commonly used strategies are: manual workaround, reciprocal arrangement, gradual recovery, intermediate
nt of data that may be lost when service is restored afer an interruption. The recovery point objective is expressed as a length of time befo
llowed for the recovery of an IT service following an interruption. The service level to be provided may be less than normal service level tar
on items to provide fault tolerance. The term also has a generic meaning of obsolescence, or no longer needed.
people or things. In business relationship management, it is the interaction between the IT service provider and the business. In configura
ludes business relationship management and supplier management.
to an IT service that are built, tested and deployed together. A single release may include changes to hardware, sofware, documentation,
ble for planning, scheduling and controlling the build, test and deployment of releases, and for delivering new functionality required by the
used to uniquely identify a release. The release identification typically includes a reference to the configuration item and a version number
oyment management.
dealing with a particular category of service request. A request model defines specific agreed steps that will be followed for a service reque
items that will be built, tested and deployed together as a single release. Each release package will usually include one or more release un
process group that includes release management. This group does not include any other processes. Release process is also used as a synon
the content of a release. A release record has relationships with all configuration items that are affected by the release. Release records ma
service that are normally released together. A release unit typically includes sufficient components to perform a useful function. For examp

e Design) A measure of how long an IT service or other configuration item can perform its agreed function without interruption. Usually me
ver afer a failed change or release. Remediation may include back-out, invocation of service continuity plans, or other actions designed to
orrection of a failed configuration item.
a change to be made. It includes details of the proposed change, and may be recorded on paper or electronically. The term is ofen misuse
ble for managing the lifecycle of all service requests.
hat is needed – for example, a service level requirement, a project requirement or the required deliverables for a process.
e or other configuration item to resist failure or to recover in a timely manner following a failure. For example, an armoured cable will resis
r the root cause of an incident or problem, or to implement a workaround. In ISO/IEC 20000, the resolution process is the process group th
ludes incident and problem management.
ludes IT infrastructure, people, money or anything else that might help to deliver an IT service. Resources are considered to be assets of an
an operation or transaction. Used in capacity management as a measure of IT infrastructure performance, and in incident management as
ond to something. This could be response time of a transaction, or the speed with which an IT service provider responds to an incident or
n an IT service to the users afer repair and recovery from an incident. This is the primary objective of incident management.
f an IT service, or other configuration item, from the live environment. Being retired is a stage in the lifecycle of many configuration items.
profitability of a business unit or organization. Return on assets is calculated by dividing the annual net income by the total value of assets.
e Strategy) A measurement of the expected benefit of an investment. In the simplest sense, it is the net profit of an investment divided by t
e continuity plan during which full normal operations are resumed. For example, if an alternative data centre has been in use, then this ph
ess, project etc. Reviews are typically carried out at predefined points in the lifecycle, and especially afer closure. The purpose of a review
missions, granted to a user or role – for example, the right to modify particular data, or to authorize a change.
r loss, or affect the ability to achieve objectives. A risk is measured by the probability of a threat, the vulnerability of the asset to that threa
lysing the value of assets to the business, identifying threats to those assets, and evaluating how vulnerable each asset is to those threats.
ssessing and controlling risks. Risk management is also sometimes used to refer to the second part of the overall process afer risks have b
horities assigned to a person or team. A role is defined in a process or function. One person or team may have multiple roles, for example
ginal cause of an incident or problem.
fies the root cause of an incident or problem. Root cause analysis typically concentrates on IT infrastructure failures. See also

guration item etc. to perform its agreed function when the workload or scope changes.
ss, procedure, certification, contract etc. applies. For example, the scope of change management may include all live IT services and related
hierarchy of support groups involved in the resolution of incidents and investigation of problems. Each level contains more specialist skills,

nformation that are used to support information security management. The security management information system is part of the inform

ng a solution or IT service that divides the problem into pieces that can be solved independently. This approach separates what is to be don
nnected to a network and provides sofware functions that are used by other computers.
by facilitating outcomes customers want to achieve without the ownership of specific costs and risks. See also IT service.
to ensure that an IT service meets its functionality and quality requirements and that the IT service provider is ready to operate the new IT
e assessment of the business impact of incidents. Service analytics models the dependencies between configuration items, and the depend
ovider. See also asset.
ble for ensuring that assets required to deliver services are properly controlled, and that accurate and reliable information about those ass
e Design) The sub-process of capacity management responsible for understanding the performance and capacity of IT services. The resourc
document with information about all live IT services, including those available for deployment. The service catalogue is part of the service

e or more IT services. The term is also used to mean any agreement to deliver IT services, whether this is a legal contract or a service level
objectives of a service culture are customer satisfaction and helping customers to achieve their business objectives.
an IT service. Service design includes a number of processes and functions and is the title of one of the core ITIL publications.
aspects of an IT service and its requirements through each stage of its lifecycle. A service design package is produced for each new IT serv
ntact between the service provider and the users. A typical service desk manages incidents and service requests, and also handles commu
s underlying causes of one or more IT service interruptions. Service failure analysis identifies opportunities to improve the IT service provid
e Design) An agreed time period when a particular IT service should be available. For example, ‘Monday–Friday 08:00 to 17:00 except publi
al plan to implement improvements to a process or IT service.
abases that are used to manage knowledge, information and data. The service knowledge management system includes the configuration
inst one or more service level targets. The term is sometimes used informally to mean service level target.
e Design) An agreement between an IT service provider and a customer. A service level agreement describes the IT service, documents serv
e Design) The process responsible for negotiating service level agreements, and ensuring that these are met. It is responsible for ensuring th
y and warranty for a particular service package. Each service level package is designed to meet the needs of a particular pattern of business
e Design) A customer requirement for an aspect of an IT service. Service level requirements are based on business objectives and used to n
e Design) A commitment that is documented in a service level agreement. Service level targets are based on service level requirements, and

at a configuration item will be unavailable due to planned maintenance activity.


ities for providing value to customers in the form of services.
hat emphasizes the importance of coordination and control across the various functions, processes and systems necessary to manage the f
e service provider. Most commonly used to refer to a business relationship manager, a process manager or a senior manager with respons
w service assets interact with customer assets to create value. Service models describe the structure of a service (how the configuration ite
e of an IT service. Service operation includes a number of processes and functions and is the title of one of the core ITIL publications.
esponsible for managing one or more services throughout their entire lifecycle. Service owners are instrumental in the development of ser
of an IT service that is available to be delivered to customers. A service package includes a service level package and one or more core serv
ed document listing all IT services that are under consideration or development, but are not yet available to customers. The service pipeline
rvices that are managed by a service provider. The service portolio is used to manage the entire lifecycle of all services, and includes three
e for managing the service portolio. Service portolio management considers services in terms of the business value that they provide.
e of the overall capabilities and resources of the IT service provider.
ng services to one or more internal customers or external customers. Service provider is ofen used as an abbreviation for IT service provid
he IT service provider and a user, customer, business process or supplier. Analysis of service provider interfaces helps to coordinate end-to-
and constraints of an IT service to decide if alternative approaches to service delivery might reduce costs or improve quality.
cess responsible for producing and delivering reports of achievement and trends against service levels. Service reporting should agree the
m a user for something to be provided – for example, a request for information or advice, to reset a password or to install a workstation for
ach for deciding whether to provide a service internally or to outsource it to an external service provider. Service sourcing also means the e
ore ITIL publications. Service strategy establishes an overall strategy for IT services and for IT service management.
e of an IT service. Service transition includes a number of processes and functions and is the title of one of the core ITIL publications.
ble for validation and testing of a new or changed IT service. Service validation and testing ensures that the IT service matches its design sp
total cost of delivering an IT service, and the total value to the business of that IT service. Service valuation is used to help the business and
e Design) The ability of a third-party supplier to meet the terms of its contract. This contract will include agreed levels of reliability, maintain
cess responsible for defining and managing the steps needed to identify, define, gather, process, analyse, present and implement improvem
eople who carry out a specific role for a fixed period of time. For example, there could be four shifs of IT operations control personnel to su
e Design) A technique that creates a detailed model to predict the behaviour of an IT service or other configuration item. A simulation mod
nsistent way to communicate with an organization or business unit. For example, a single point of contact for an IT service provider is usuall
hat can cause an incident when it fails, and for which a countermeasure has not been implemented. A single point of failure may be a perso
e level agreement monitoring chart is used to help monitor and report achievements against service level targets. A SLAM chart is typically
e Design) An acronym for helping to remember that targets in service level agreements and project plans should be specific, measurable, ac
e Transition) The current state of a configuration item, process or any other set of data recorded at a specific point in time. Snapshots can b
ble for tracking and reporting the use and ownership of sofware assets throughout their lifecycle. Sofware asset management is part of an

ecification may be used to define technical or operational requirements, and may be internal or external. Many public standards consist of
anization, project, IT service etc. Stakeholders may be interested in the activities, targets, resources or deliverables. Stakeholders may inclu
ude ISO/IEC 20000 (an international standard), an internal security standard for Unix configuration, or a government standard for how finan
nge that is low risk, relatively common and follows a procedure or work instruction – for example, a password reset or provision of standard
T operations management.
es that are not required to deliver the live IT services, but are available to support IT service continuity plans. For example, a standby data c
all requirements for a product purchase, or a new or changed IT service. See also terms of reference.
es of record. It shows the current stage in the lifecycle of the associated configuration item, incident, problem etc.
le for recording and reporting the lifecycle of each configuration item.
ble for managing the storage and maintenance of data throughout its lifecycle.
vels of planning and delivery (strategic, tactical, operational). Strategic activities include objective setting and long-term planning to achieve
ed to achieve defined objectives.
e defining and maintaining an organization’s perspective, position, plans and patterns with regard to its services and the management of th
er users, and assists in communication with the service desk or other parts of the IT service provider. Super users typically provide support
party responsible for supplying goods or services that are required to deliver IT services. Examples of suppliers include commodity hardwa
nformation that are used to support supplier management. See also service knowledge management system.
for ensuring that all contracts with suppliers support the needs of the business, and that all suppliers meet their contractual commitments
chain carried out by suppliers. A supply chain typically involves multiple suppliers, each adding value to the product or service.
th technical skills. Support groups provide the technical support needed by all of the IT service management processes.
times or hours when support is available to the users. Typically these are the hours when the service desk is available. Support hours shoul
directly used by the business, but is required by the IT service provider to deliver customer-facing services. For example, a directory service
ique that reviews and analyses the internal strengths and weaknesses of an organization and the external opportunities and threats that it
ether to achieve an overall objective. For example:
ocuses on the management of IT infrastructure rather than process.
d delivery (strategic, tactical, operational). Tactical activities include the medium-term plans required to achieve specific objectives, typicall
entify a category. For example, tags EC1, EC2, EC3 etc. might be used to identify different customer outcomes when analysing and compari
ible for providing technical skills in support of IT services and management of the IT infrastructure. Technical management defines the role
ique used in service improvement, problem investigation and availability management. Technical support staff meet to monitor the behavi

related metrics, in which improvements to one metric have a negative effect on another. Tension metrics are designed to ensure that an a
he requirements, scope, deliverables, resources and schedule for a project or activity.
es that a configuration item, IT service, process etc. meets its specification or agreed requirements. See also acceptance; serv
ment used to test configuration items, builds, IT services, processes etc.
t is not part of the service provider’s own organization – for example, a sofware supplier, or a hardware maintenance company. Requirem
erarchy of support groups involved in the resolution of incidents and investigation of problems. Each level contains more specialist skills, or
ulnerability. Any potential cause of an incident can be considered a threat. For example, a fire is a threat that could exploit the vulnerability
n alert to be generated or management action to be taken. For example, ‘Priority 1 incident not solved within four hours’, ‘More than five s
r of transactions or other operations performed in a fixed time – for example, 5,000 e-mails sent per hour, or 200 disk I/Os per second.
help make investment decisions. It assesses the full lifecycle cost of owning a configuration item, not just the initial cost or purchase price
help make investment and service sourcing decisions. Total cost of utilization assesses the full lifecycle cost to the customer of using an IT
odology for managing continual improvement by using a quality management system. Total quality management establishes a culture invo
rvice – for example, transferring money from one bank account to another. A single transaction may involve numerous additions, deletions
responding to a movement of an IT service or other configuration item from one lifecycle status to the next.
ble for planning all service transition processes and coordinating the resources that they require. These service transition processes are cha
s of data to identify time-related patterns. Trend analysis is used in problem management to identify common failures or fragile configuratio
nges to make the most efficient use of resources. Tuning is most commonly used in the context of IT services and components. Tuning is als
vider that is embedded within a business unit. There may be several Type I service providers within an organization.
vider that provides shared IT services to more than one business unit.
provides IT services to external customers.
T service provider and a third party. The third party provides goods or services that support delivery of an IT service to a customer. The und
ce provider of providing a single component of an IT service. For example, the cost of a single desktop PC, or of a single transaction.
asure of how long it will be until an incident, problem or change has a significant impact on the business. For example, a high-impact incid
application, product or IT service can be used. Usability requirements are ofen included in a statement of requirements.
ne required functionality and objectives, and to design tests. Use cases define realistic scenarios that describe interactions between users a
y-to-day basis. Users are distinct from customers, as some customers do not use the IT service directly.
nd for IT services. Each user profile includes one or more patterns of business activity.
d by a product or service to meet a particular need. Utility can be summarized as ‘what the service does’, and can be used to determine w
es a new or changed IT service, process, plan or other deliverable meets the needs of the business. Validation ensures that business requir
es that creates a product or service that is of value to a customer. Each step of the sequence builds on the previous steps and contributes to
s. Value for money is ofen based on a comparison with the cost of alternatives. See also cost benefit analysis.
onships between two or more groups or organizations. Value is generated through exchange of knowledge, information, goods or services.
urement of the expected benefit of an investment. Value on investment considers both financial and intangible benefits.
how much the IT service is used, how many products are produced, the number and type of users, or something else that cannot be fixed
derstand how overall costs are affected by the many complex variable elements that contribute to the provision of IT services.
and the actual measured value. Commonly used in financial management, capacity management and service level management, but could
es that a new or changed IT service, process, plan or other deliverable is complete, accurate, reliable and matches its design specification.
ible for ensuring that information in the configuration management system is accurate and that all configuration items have been identified
entify a specific baseline of a configuration item. Versions typically use a naming convention that enables the sequence or date of each bas
ends to become in the future. A vision is created by senior management and is used to help influence culture and strategic planning.
s that is critical to the success of the business. Vital business functions are an important consideration of business continuity management
threat – for example, an open firewall port, a password that is never changed, or a flammable carpet. A missing control is also considered to

ct or service will meet agreed requirements. This may be a formal agreement such as a service level agreement or contract, or may be a m
d but are not yet complete. It is commonly used as a status for incidents, problems, changes etc.
ons that specify exactly what steps to follow to carry out an activity. A work instruction contains much more detail than a procedure and is
ng the impact of an incident or problem for which a full resolution is not yet available – for example, by restarting a failed configuration ite
tifiable part of an IT service. Workloads may be categorized by users, groups of users, or functions within the IT service. This is used to assi

narios, support
ram and a terminal. Data being transferred from or to an allocated primary or tertiary device, or to the host system, as a continuous stream of data and 327

normal termination.
nonymous with abend, abnormal end.

are found as SYSMOD entries in the distribution zone.

ALTER, and EXECUTE.

ees for the resource to which the ACE applies.

ARM Holdings). The RISC based design requires fewer transistors resulting in lower costs, reduced power consumption, and less heat. This m

d applications that do not need AD DS. See Active Directory Lightweight Directory Services Overview Jump .
MT Guide: Migrating and Restructuring Active Directory Domains Jump .

dows NT SAM account database, Novell bindery, Novell NDS, and Internet Information Server (IIS).
this tool to manage contacts, groups, containers, and Organizational Units.
y Services instances, and Active Directory Database Mounting Tool instances on a Windows Server 2008 R2 (or above) server. See What's Ne
ported .NET language. Successor to ASP. See ASP.NET Jump .
ng ADO are only allowed in the LDAP namespace. ADO can also be used to access Microsof Access databases, SQL Server databases, and e

networks only. IPv6 networks use the Neighbor Discovery Protocol for translating protocol addresses. For more information, see RFC 826 (h

e up to 16 exabytes of contiguous virtual storage addresses that the system creates for the user. An address space contains user data and programs, as we
s space. See Address Windowing Extensions Jump .
can be 24, 31, or 64 bits in length.

network as the local node. An adjacent node can be either a destination node or a relay node.

s, thereby isolating the effects of single points of failure; (b) dynamic exchange of network topology information to foster ease of connection, reconfiguration

d share the processing of programs.
vanced Threat Analysis.

ess mappings (Office SharePoint Server) Jump .

ple naming-related attributes in a single clause. The attributes must be ANR enabled in the directory schema. See Active Directory: Ambigu

by a permanent correction called a PTF. APAR fixes are identified to SMP/E by the ++APAR statement.

se sensitive system functions. To maintain system security and integrity, a program must be authorized by the APF before it can access restricted functions,
exchange information and that contains the application-oriented protocols by which these processes communicate.

sessions based on requested classes of service


work node. It uses these sessions to dynamically register its resources with the adjacent CP (its network node server), to send and receive directory search

bone IP subnet or be connected to another backbone router over a virtual link.

der, the process is called data encapsulation.

ats, storage structures, and registers of the computer.

nteractive job at a work station. See synchronous processing.
containing information from an individual user is not necessarily periodic. ATM is specified in international standards such as ATM Forum UNI 3.1.

attributes in the digital document are used mainly for authorization.


rt number, and DS field.

anted to the user or process.

should be included in the extensions of issued certificates Jump .

is called an APAR fix.

 after all the primary input has been processed. The automatic call library can be:

ginning of a job step. Contrast with deferred restart. See checkpoint restart.
 is running unexpectedly fails, z/OS can restart the job without operator intervention.

ed, within a certain time frame. Generally, the percentage is derived by dividing actual availability time by scheduled availability time. Scheduled outages (n

nd one of the services available is Active Directory.

bet Soup Jump . Also Binary 2 (to) Open XML. See Binary to Open XML (B2X) Translator: Interoperability for the Office binary file formats Ju
ration, a high-speed link to which the rings are connected by means of bridges or routers. A backbone may be configured as a bus or as a ring. (3) In a wid
gh the SUBMIT command or SYSIN are executed. One job step at a time is assigned to a region of central storage, and it remains in central storage to com

ntrast with foreground job.
ut is also called rollback or abort.
her connectors, forming a computer bus.
et to ensure against accidental loss.
onger apply in Active Directory, which uses a multi-master database system where all domain controllers are are essentially equal.
buting host when required. See distributing host.

dium (such as a TV cable) to convey data. (3) Data rate transfer in K bits, K bytes, M bits, and M bytes per second. (4) In asynchronous transfer mode (ATM

ctions are identified to SMP/E by the ++FUNCTION statement. SMP/E itself is an example of a base function of z/OS.
ications are applicable.

d by a request/response unit (RU).

withinteractive job .
t like programs in a batch environment, they are started with job control language (JCL).
 or operator. Contrast with interactive processing .

z/Architecture™. Contrast with little endian.
ing a 64 character alphabet of printable characters. Used by the ldifde command line utility.
ata consisting of numeric values stored in bit patterns of 0s and 1s. Binary data can cause a large number to be placed in a smaller space of storage.

systems or logical units. (3) In SNA, a request to activate a session between two logical units (LUs).
ces the linkage editor and batch loader used in earlier forms of the z/OS operating system, such as MVS™ and OS/390®.

s recorded or transmitted as a unit. (5) A sequence of text, commands, or records that are read, written, or processed as a unit.
aracters. Synonymous with block length and physical record size.

llection consists of processor chips, memory cards, and adapter cards that connect the processors and memory to input/output devices.
://www.iet.org/rfc/rfc4271.txt).
e networks. See extended border node, peripheral border node.
h control and peripheral.

d node to the wide area network.

s control protocols. A bridge forwards a frame to another bridge based on the medium access control (MAC) address.

ntrast with directed Locate search.

of events by temporarily holding a block of data that is waiting to be processed or written to an I/O device.
mber of physical reads.

Rules Engine Jump .


es between processors and controllers, which may be as far away as another physical site. Also known as fiber management cabinets.

be needed next by the processor.
 cache structure to implement several different types of caching systems, including a store-through or a store-in cache.

t (initial caller) side of this protocol.

of the next line. (3) A character that will cause printing to start at the beginning of the same physical line in which the carriage return occurred.
etects another signal during transmission, it stops transmitting, sends a jam signal, then waits for a variable time before trying again.

ta set indexes that are used by the control program to locate a volume containing a specific data set.

y providing a focal point for queries and broadcast searches, and by caching the results of network searches to avoid later broadcasts for the same informa

chine operations.
directly return results. (Formerly referred to as "real storage".) (2) Synonymous with processor storage.
ignatures and public-private key pairs. CA guarantees the identity of the individual who is granted the unique digital certificate.

ply for a digital identity certificate. See Certificate signing request Jump .

hentication uses the notion of challenge and response, where the system that receives a call challenges the caller to prove its identity.

h channel is an independent unit that transfers data concurrently with other channels and the CPU. For example, in a 64-channel computer, 64 streams of d

ication tasks, and performs path management functions.

ugh a switch, both CHPIDs must be connected through the same or a chained switch.

in the form of a spatial arrangement of adjacent or connected strokes.

 and the system can be recorded so that the job step can be restarted later.

ntil the connection is released. Synonymous with line switching. See packet switching.
rces. See client-server, server.

lso Cloud Application Security.


ts a response. The requesting program is called a client; the answering program is called a server.

that implements the Microsof CryptoAPI (CAPI). See Cryptographic Service Providers Jump . Also the Configuration Service Provider.

multiple access Jump .


ode points for an 8-bit code, assignment of characters and meanings to 128 code points for a 7-bit code. (2) A particular assignment of hexadecimal identifie

 system to respond in the following ways to a new function that was introduced on another system with which it shares resources: ignore a new function; te

g character string is a single command.
s and their associated message responses.

 than to z/OS.

. Also Cluster Shared Volume. See Use Cluster Shared Volumes in a failover cluster Jump .

ormation Model Jump .


d by the .NET Framework and produced by .NET compilers. Independent of CPU or higher level languages. Intermediate between assembly
ws multiple high level languages on different computer platorms without rewritting code for different architectures. The .NET Framework
opment process easier. See Common Language Runtime (CLR) Jump . Also Claim Rule Language. See The Role of the Claim Rule Language Ju

West,dc=mydomain,dc=com".

ages the details of line control and the routing of data through a network.
 (b) multiple concurrent connections that use a wide range of protocols, and (c) several application programming interfaces (APIs) that may be called concu
 the movement of large amounts of data. CSM enables authorized host application programs to put data in buffers that can be addressed and accessed by 

y the compiler, the types of printed output to be produced, the efficient use of the compiler, and the destination of error messages. Also called compiler-time

de as a single network node.
presses all the data within packets that are sent on the link.

available within the transmission medium. (2) Any device that combines incoming messages into a single message (concentration) or extracts individual me

wning region and terminal owning region .


pplications that provides reliable data stream delivery service. In Internet communications, a connection extends from a TCP application on one system to a

nnection Manager Administration Kit Jump .


nal units without modifying them.

s a console to display synchronous messages.

etwork Jump .

of records that an entry in the sequence-set index record points to. The control interval is the unit of information that VSAM transmits to or from disk. A contr

age locations.

nditional statement, such as IF, or an imperative statement, such as STOP. In JCL, a statement in a job that is used in identifying the job or describing its re
e operation of the system as a whole. Each physical controller contains one or more logical control units, channel and device interfaces, and a power source

e controller (NIC).

y enough for the user to maintain a train of thought.
ment capabilities, and operates only under the control of the VM/370 control program.

d contains, in addition to other information, the address of the record in the format: CCHHR (where CC is the two-digit cylinder number, HH is the two-digit 
S systems in a sysplex. See sysplex couple data set.

he central processor complexes directly attached to it.

es are exchanged. Each CP of a given pair has one contention-winner session and one contention-loser session with the other.
es on its top, which can connect to objects above it such as processors or other crossbars. The crossbar switch also contains a number of control unit inter

CF supports program communication and sends program status and signal information between z/OS system images in a sysplex.
ex environment, to implement high-performance, | high-availability data sharing by using a coupling facility.

ment's Suite B cryptographic algorithms. See Cryptography Next Generation Jump .

als in support of business and commercial applications. CICS enables transactions entered at remote terminals to be processed concurrently by user-writte

etwork packet's header. Flows can be associated with an SLA and used for observability.
that can be accessed by all the magnetic heads of a comb in a given position, without repositioning the access mechanism.

mons are triggered automatically to perform their task; others operate periodically. An example is the cron daemon, which periodically performs the tasks lis

. See Data analysis expressions Jump .


the same network link, for example, when sharing a datalink between networking and storage protocols.

ata center bridging features.

ouds Jump .

guage Jump .
ymbolic representation for a name placed in the name field of a data definition (DD) statement.

ORKING-STORAGE data items, LINKAGE SECTION data items, and LOCAL-STORAGE data items that are needed.

(AES). See Data Encryption Standard Jump .

operations, as well as providing versatile data manipulation at the record, field, and bit level.

ommunication link. The data link layer detects, and possibly corrects, errors that may occur in the physical layer.
otocols that use LLC type 2. See encapsulation, spoofing.

at are used on telecommunications lines and provides a standard data communications interface.

m for data set control blocks and tape data set labels.
ing data integrity.
es (users) without inadvertently being modified.
ll information (data and control commands) sent over a data link usually in a single read or write operation. For example, a data stream is used to send disp

and then presents the data to decision makers so that they can interpret and use it effectively and efficiently.

Web Sites Jump . Also Desktop as a Service.

See DBCC (Transact-SQL) Jump . Also DataBase Consistency Check, an SQL Server command line utility.

al equipment (DTE) to the destination DTE without relying on earlier exchanges between the DTEs and the network.

ultiple switches without requiring switch configuration.


 other. (2) Unresolvable contention for the use of a resource. (3) An impasse that occurs when multiple processes are waiting for the availability of a resour

 to the table. The declarations are generated from DB2 system catalog information.

r. See checkpoint restart. Contrast with automatic restart.
MOD entry for the deleted function.
in resources that a company offers to the public, such as web servers, anonymous FTP servers, and databases.

ains SSCP services for these dependent LUs from a dependent LU server (DLUS) located elsewhere in an APPN network. The flows of SSCP services betw
where in an APPN network.

ode name is specified). (2) Any point or location, such as a node, station, or a particular terminal, to which information is to be sent. (3) An external logical u

 the channel to which the device is attached. The two rightmost digits represent the unit address.

e host operator. The device number that you associate with a subchannel.

ddresses and TCP/IP settings to other computers. See DHCP (Dynamic Host Configuration Protocol) Basics Jump .
her dialogs. For example, HCM provides a series of dialogs to help you create, edit, delete, and connect objects, as well as manipulate the configuration dia

 certificate is issued by a certification authority and is digitally signed by that authority.

e of data transfer is known as direct memory access (DMA).


rect memory access Jump .

ffic from the servers to the clients bypass the Integrated Load Balancer.

 the resource at the destination node and to obtain the node's connectivity information for route calculation. Contrast with broadcast search. Synonymous w
contain subdirectories of their own. (2) A file that contains directory entries. No two directory entries in the same directory can have the same name. (POSIX

es a DSRM password.

ta to a second (recovery) system, then using the recovery system in place of the destroyed or disabled application system. See recovery, backup, recovery

S task control. See service request block .

X.509 certificates.

ters. Extends COM. See Distributed Component Object Model Jump .

he individual computers.

lications. DCE is independent of the operating system and network; it provides interoperability and portability across heterogeneous platforms.

nt machines. DFS allows users to access and share files stored on a file server anywhere in the network, without having to consider the physical location of
File System (Microsof) Jump .

e to connect to the sysplex.
MZ (computing) Jump .

stered as a unit with a common protocol.

nonymous with name server.
the enterprise, such as those on the Internet. DNS is the network information service used by the Internet. For more information, see RFC

ecurity policies, cryptographic algorithms, and cryptographic modes are examples of security-relevant information.

attack Jump .

Korean, which contain more symbols than can be represented by 256 code points, require double-byte character sets. Because each character requires two

ded. For more information, see RFC 2474 (https://www.rfc-editor.org/rfc/rfc2474.txt).

all or part of storage for the purpose of collecting error information. (3) Data that has been dumped.
tion. See Dynamic Access Control: Scenario Overview Jump .

r mechanism. This protocol enables hosts on a TCP/IP network to request and get the assigned IP addresses, and also to discover informati

be shared by several applications simultaneously.
are resources can be added or replaced with little or no interruption to normal system operations. Not all Sun platorms from Oracle suppo

ernet technologies.

ent of traffic SLAs to the switch.

ity between the virtual machines on multiple servers connected to the elastic virtual switch.

p of these devices. During IPL, the installation identifies the EDT that z/OS uses. After IPL, jobs can request device allocation from any of the esoteric devic

supports. In this respect, the layer encapsulates the data from the supported layer. In the Internet suite of protocols, for example, a packet would contain co
psulation of SNA application traffic within UDP frames.

n. See entry point.
s passed when the load module is invoked.

typically assigned to client processes that must provide servers with a client port number so that the server can respond to the correct process.
op. When forwarding a packet, the router must decide which next-hop (path) to use. For more information, see RFC 2992 (http://tools.iet.o

e ESCON Manager.
e ESCON Director.
each LPAR with its own channel-subsystem image.
elationship of these devices. The name you assign to an esoteric is used in the JCL DD statement. The job then allocates a device from that group instead 

Access with Collision Detection (CSMA/CD) as the access method. Ethernet is standardized in the IEEE 802.3 specification.

on SYSMODs.

 link-edited and can therefore be run in a processor. (3) A program that can be executed as a self-contained procedure. It consists of a main program and, o
estination subarea address, an explicit route number, and a reverse explicit route number. Contrast with virtual route (VR).
with ASCII and Unicode.
N network, where the partitioning is to allow isolated topology subnetworks (or clusters). An extended border node supports intermediate network routing, a
 extended MCS console is defined through an OPERPARM segment.
ms for disaster recovery, device migration, and workload migration.
connect and access the Internet. It is an identifying name for all 802.11 wireless networks.
a network configuration. ENMs provide the ability to specify when applications or scripts, for example, a VPN application, must perform its

ication server switches over to a backup system due to the failure of the primary server. (3) The routing of all transactions to a second controller when the f

MRI includes the package publisher, package name, and version of the sofware package.

 large number of devices per control unit for mainframe systems. It can work with, or replace, ESCON links.

ables and patchports in fiber management cabinets. Each connection in the fiber link is either permanent or mutable.

nvergence and cost-effective storage area network (SAN) expansion in large deployments.

xt or graphics (data-file object), or processes a series of commands (batch file). See data set .
ver that functions to isolate a secure network from an insecure network.
ntial problem when it occurs.

 footprint. (2) Amount of floor space occupied by a piece of equipment.
ed in and out of central storage to allow CPU time to be shared among terminal users. All command processor programs execute in the foreground. Contras
sor or a terminal user's program. Contrast with background job.
ns, as the primary key of the parent table. Each foreign key value must either match a parent key value in the related parent table or be null.

f certain fields. TH formats differ in accordance with the types of nodes between which they pass.
letters, that is, FORTRAN.

sor cluster, a frame contains one or two central processor complexes (CPCs), support elements, and AC power distribution. (2) In networking, the block of in
virtual connection.

n-the-blanks prompting.

/E by the ++FUNCTION statement. Each function must have a unique FMID.

erent communication protocols, different network architecture, or different security policies, in which case the gateway performs a translation role as well as
, for the purpose of problem determination. Like system trace, GTF gathers information used to determine and diagnose problems that occur during system

3a, -3b belong to the same generic. Every generic has a generic name that is used for device allocation in the JCL DD statement. z/OS interprets this name
res. The GLDv3 framework implements the necessary STREAMS entry points on behalf of GLDv3 compliant drivers and handles DLPI compa

tion availability and improve disaster recovery. GDPS topology is a Parallel Sysplex cluster spread across two sites, with all critical data mirrored between t

s on shared DASD volumes).

ation that (1) enables SMP/E to access target and distribution zones in that system, and (2) enables you to tailor aspects of SMP/E processing.

t with software .

t is used with an iterative cryptographic hash function, such as SHA-1, in combination with a secret shared key. The cryptographic strength
ating can result in the malfunction or destruction of the parts generating the heat or might cause damage to other parts of the circuit.
and A through F, giving values of 0 through 15.

n a hierarchical structure, that can be accessed using z/OS UNIX System Services facilities.

 are C, C++, COBOL, Fortran, and PL/I.

ernal networking connection between servers running in different LPARs.

D and ++RELEASE statements are used to define HOLDDATA. SYSMODs affected by HOLDDATA are called exception SYSMODs.

ctions, such as: control of job flow, ordering of tasks, and spooling. See JES2.

such as browsers.
e location of wiring concentrators.

 the head of string, contains string interfaces which connect to controller device interfaces and eventually to processor CHPIDs. Devices are represented a

protected resources; logging detected, unauthorized attempts to enter the system; and logging detected accesses to protected resources. Also known as Re

pplication program.
managing complex databases and terminal networks.

age and z/OS is made ready to perform work. Synonymous with boot, load.

trol, and at completion of the job, supplies control information for writing job output on a system output unit.

The IOCDS contains I/O configuration data for the files associated with the processor controller on the host processor, as it is used by the channel subsyste
efinitions, including all logical objects and their connectivity in the hardware configuration.

SDN. Solaris PPP 4.0 configuration files are used to configure an ISDN TA when used as a standard modem.

em. Contrast with batch.
umps, problem tracking, and problem reporting.

a. (2) Contrast with migration data host.
information, see https://www.iana.org.

ls.iet.org/html/rfc792) and RFC 4443 (https://tools.iet.org/html/rfc4443).

ee RFC 2409 (https://www.rfc-editor.org/rfc/rfc2409.txt) and RFC 7296 (https://tools.iet.org/html/rfc7296).

protocol layers and the physical network.
pression for the link and enables the use of the network layer protocols.

more information, see RFC 791 (http://www.iet.org/rfc/rfc791.txt).

www.iet.org/rfc/rfc2460.txt).

g, modifying, and deleting SAs. ISAKMP is the IETF standard for handling an IKE exchange.

the process can be resumed.

kup Language (CAML) Jump .

 9.67.97.103 is an IP address. The address field contains two parts: the first part is the network address; the second part is the host number.

nterfaces into an IPMP group.


for virtual LANs. By using IPQoS, different levels of network services to customers and applications can be provided.

 traffic by using various security services.

m the system. In an installation with more than one processor, each JES2 processor independently controls its job input, scheduling, and output processing
m the system. In complexes that have several loosely-coupled processing units, the JES3 program manages processors so that the global processor exerc

obs, it is possible to control the mixture of jobs that are performed concurrently.
ments for a job step include one EXEC statement, which specifies the program or procedure to be invoked, followed by one or more DD statements, which 

with zeros in the unused high-order position.

and stored by keyed access or by addressed access, and new records are inserted in key sequence by means of distributed free space. Relative byte addre

bridges. (2) A ring or bus network without bridges.
nd runtime services for C, C++, COBOL, Fortran, PL/I, VisualAge® PL/I, and Java™ applications compiled by Language Environment-conforming compiler

e incoming packets must share the same transport protocol, local or remote IP address, and port number. This set of attributes are also kn

t addressable by user programs. Some IBM products use it to implement functions as an alternative to hard-wired circuitry.
censed programs.

ngle point of management for storage, retrieval, and distribution of information. LDAP enables clients and servers that use LDAP naming ser

ganized in a Directory Information Tree (DIT).
k aggregation group. This protocol helps to automatically configure and maintain link aggregation groups.

the linked device, searches for errors in the link configuration, and determines the acceptable packet size for transmission.

network devices on an IEEE 802 local area network (LAN).

all tasks in the system.
base is formed from the collected link-state advertisements.
PPN or a subarea link. In the resource hierarchy in a subarea network, the link station is subordinate to the subarea link.
es to create a single relocatable load module. The linkage editor then stores the load module in a load library on disk.

e consists of a set of lists and an optional lock table, which can be used for serializing resources in the list structure. Each list consists of a queue of list entr
with big endian.

In an end node, the database has one entry for each TG connecting to the node. In a network node, the database has an entry for each TG connecting the 
e directory services components in other APPN nodes for information on the target resource. See broadcast search, directed Locate search.
sources. The lock structure supports shared, exclusive, and application-defined lock states, as well as generalized contention management and recovery p

bsystem images. Each channel subsystem image can be configured with up to 256 channel paths, and each logical partition has access to one channel sub
CSS), an LCU represents a set of CUs that physically or logically attach I/O devices in common.
pendent system. If hardware requirements are met, multiple logical partitions can exist within a system. See logically partitioned (LPAR) mode.

evices according to the addressing mechanisms of the associated I/O interfaces. One or more logical subsystems exist on a storage controller. In general, 
. An LU can support at least two sessions--one with an SSCP and one with another LU--and may be capable of supporting many sessions with other LUs.

llocate CPC hardware resources (including central processors, central storage, expanded storage, and channel paths) among logical partitions.
ervices implicitly from an adjacent APPN network node, that is, without the direct use of CP-CP sessions.

e these addresses to locate specific ports in the network and to create and update routing tables and data structures. MAC addresses are 6 bytes long and 

 to verify the authorization of a program or operator to gain access to a data set, and to accumulate usage statistics for data sets.
ent I/O data and can provide comprehensive reports.
er to provide services to the logical link control (LLC) sublayer. The MAC sublayer includes the method of determining when a device has access to the tran
ical network segment.

ay cross administrative boundaries, and may use multiple access methods. Contrast with local area network (LAN) and wide area network (WAN).

OP) for Sofware Assurance. See Overview Series: Advanced Group Policy Management Jump .

harePoint 2010 Jump .

d server mode.

r level. Completion of these activities ensures that the applications and resources on a system will function correctly at the new level.

nd converts the analog signal received to data for the computer.
ps that program has with other programs that may be installed on the same system.
 functions or change the programming support category of the release to which it applies. Contrast with release and version. Whenever a new release of a p

ubset of all possible destinations. (3) Contrast with broadcast.

ntrol units and associated I/O devices configured to these shared channels. The sharing can reduce channel requirements, improve channel utilization, and
 than z/OS UNIX system services, such as those provided by the base control program (BCP), a base element of z/OS.
rleaving items of data.

n the sysplex to communicate with each other (send messages and receive commands)
th programs on the other images.

es, converters and controllers with ESCON or FICON interfaces. Mutable connections are broken when the patchports they connect are not in use.

 of information transmitted by the path control network.
ed to limit the number of global IP addresses that are needed.

m at a time.

ink or an interface and contains properties that define the configuration for that link or interface.

M 3710 Network Controller allows the use of non-SNA devices with an SNA host processor.
Sv4, and NFSv4.1 versions. For more information about the NFS versions, see RFC 1094, RFC 1831, and RFC 5661 respectively.
a TCP/IP network that is using client software for the Network File System protocol.

ely identifies a specific subnetwork.

he igb card.
d provides the electronic functions for the data link protocol or access method, such as token ring or Ethernet.
ating job entry subsystems connected by binary-synchronous communication lines, channel-to-channel adapters, and shared queues.

ng all domains. (3) A VTAM application program authorized to issue network operator commands.

is a complete implementation of the version 4 standard as defined in RFC 5905 (https://tools.iet.org/html/rfc5905).

ork nodes and the transmission groups interconnecting them; and (b) entries for all virtual routing nodes to which network nodes are attached.

 In a nonpageable region, each virtual address is identical to its real address. Synonymous with V=R region .

e NTBackup Jump .

 specified during initialization.

 deck is in relocatable format with machine code that is not executable. Before an object deck can be executed, it must be processed by the link-edit utility. 
on Protocol (RIP), OSPF allows the lowest-cost routing and handles routing in large regional or corporate networks.
 provide direct connectivity between mainframe applications and their clients on the attached network.

O) for the exchange of information.
e transmitted over a network.

O control, and data management. Although operating systems are predominantly software, partial hardware implementations are possible.

or of specific conditions within the system, such as an error condition.

e resources. ILB can be used to improve reliability and scalability, and to minimize the response time of network services.

ude X.509 certificates and public or private key pairs. KMF also provides a tool for managing policies that define the use of X.509 certificate
nates the operations of the computer's circuit.

et. On completion of the transmission, the channel is made available for transfer of other packets. (2) Synonymous with packet mode operation. See circuit 
 To transfer instructions, data, or both, between central storage and external page storage.

ous with V=V region.

Contrast withESCON channel .
interface. This interface uses ESA/390 logical protocols over a common bus that configures attached units in a multi-drop bus topology.
rk (batch). See highly parallel.

rogram or process. Synonymous with parm.

am, or data. Synonymous with program library. Contrast with sequential data set.
 of partitioned data sets. A PDSE can be used instead of a partitioned data set.

rmation stored within it.
assword that is passed over the link, which makes it possible to store the password on one of the endpoint systems. For example, PAP can

AN) for connection to the Internet or a wide area network (WAN). A patch panel uses a cable called a patch cord to create each interconnection.
must add the number of patchports of each defined panel of the cabinet.

ctions can be point-to-point from one DASD controller to another, or they can pass through switches, just as connections from CHPIDs to control units can.
d the condition will be transferred to the next handler.
y that is used to protect data transmission is never used to derive additional keys. PFS applies to the authenticated key exchange in IKE.

e one partner LU in its native network. Contrast with extended border node.

function assistance from an adjacent subarea node. A peripheral node can be a type 1, 2.0, or 2.1 node connected to a subarea boundary node.

even when they are not in use.

dware is attached to a processor through physical channels. Channels have a physical channel identifier (PCHID) which determines the physical location o
ure and is used to manage the SR-IOV functionality. PFs are fully featured PCIe functions that can be discovered, managed, and manipulate

h, maintain, and release physical connections over the transmission medium.

urces (such as attached links and adjacent link stations) of a node, as requested by a system services control point logical unit (SSCP-LU) session.
A-side of the processor controller controls side 0; the B-side of the processor controller controls side 1. Contrast with single-image (SI) configuration .

oblems or running lengthy and complicated business transactions and record-keeping applications.

ation consists of two endpoint computers called peers, and the telephone lines or other bidirectional link that the peers use for communica
d based on UNIX. POSIX is not a product. Rather, it is an evolving family of standards describing a wide spectrum of operating system components ranging

SL) services.

ware is implemented as the ptpd daemon, which is an implementation of the PTP Version 2 as defined in the IEEE standard 1588-2008.

Support Center.

vice (CoS) values. In PFC, the traffic is paused selectively only for the CoS values that are enabled in the PFC frame instead of halting all the

 By removing errors, which often requires a structural change to the IT infrastructure in an organization, the numbers of incidents are reduced over time.

names for this concept of a procedure. In C, a procedure is called a function. In COBOL, a procedure is a paragraph or section that can only be performed 
er of channel path IDs, or CHPIDs, which are the logical equivalent of channels. The logical processor may be divided into a number of logical partitions.

ning capability. See LPAR.

 reported the error.
dressing exception.

hem on the operating system.
ponent-overflow, and significance exceptions should cause a program interruption. The bits of the program mask can be manipulated to enable or disable t

ries and have fewer restrictions than load modules. Program objects are produced by the binder.
 the computing system in relation to a particular program. See program mask.

twork components.

ty involved in an Internet transaction.

erver reference main storage directly through a set of data queues. The QDIO architecture is used by Open Systems Adapter-Express (OSA-Express), Hipe
t data blocks awaiting transfer to auxiliary storage are queued on the system to minimize delays in I/O operations.

ppression equipment, and other support equipment.
 done with the RECEIVE command.

ed into temporary SMPTLIB data sets. SMP/E RECEIVE processing automatically allocates the temporary partitioned data sets that correspond to the files 

ystem resources in an orderly manner.

ormation about a single object. A record is made up of a number of distinct items, called fields. A number of shell programs (for example, awk, join, and sort

me operating systems. Contrast with byte stream.

ble for use on the recovery system. This is usually accomplished through backup and recovery techniques, or through various DASD copying techniques, su

 security and a certain degree of fault tolerance in case of hardware failures.
to achieve data redundancy.

hared resources, if appropriate serialization is in place to prevent interference between using tasks. See reusability. reentrant.

e modified by itself or any other module during execution. See reusability.

es developed by IBM.

e available. See peer-to-peer remote copy and extended remote copy.
h encountered in the input stream.
andards are documented as RFCs.

may reside anywhere in virtual storage.

uthorizing access to protected resources, logging the detected unauthorized attempts to enter the system and logging the detected accesses to protected re

stem level syncpoint manager.
 contain additional information (such as session parameters in response to BIND SESSION). If negative, the response unit contains sense data defining the

users and computer professionals. It is also useful for application macros. REXX includes the capability of issuing commands to the underlying operating sy

able, reenterable, serially reusable.
olve MAC address into an IP address on the local area network. For more information, see RFC 903 (http://tools.iet.org/rfc/rfc903.txt).

rd explicit route.

cation list Jump .

odes for a given class of service.
ols, algorithms that attempt to identify the shortest or best path, and other criteria such as metrics or protocol-specific destination addresses.
nguages use routines. (2) A database object that encapsulates procedural logic and SQL statements, is stored on the database server, and can be invoked 
r more information, see RFC 2453 (https://tools.iet.org/html/rfc2453).

es between internet hosts. This protocol determines optimum routes on the basis of route metrics, not link transmission speed.
ts on the LAN. For more information, see RFC 2080 (http://tools.iet.org/rfc/rfc2080.txt).

pology and destination feasibility.

ost that does a more virulent attack.

mechanism authenticates both the host and the user who is making a request for a service. The authentication mechanism uses DES encryp

d to prevent eavesdropping, tampering, and message forgery.

keying material for IPsec SAs.

he secure transmission of data.


data set. (2) A data set in which the contents are arranged in successive physical order and are stored as an entity. The data set can contain data, text, a pr
y a new task until the previous task has exited. See reusability.
r that contains programs, data, or provides the facilities that other computers on the network can access. (3) The party that receives remote procedure calls
pace could be a CICS AOR, or an IMS control region.

 to an entity of the next higher layer. (2) A logical point made available by an adapter where information can be received and transmitted. A single service ac

d all the SYSMODs that have updated the element since it was last replaced.

mers, such as telecommunication companies, application service providers, enterprise IT, and Internet service providers.

ed on to the system until it is logged off the system. (2) The period of time during which programs or devices can communicate with each other. (3) A logical
 various protocols during session activity; for example, BIND and ACTPU.

ed and does not have to be loaded in the user region.

running, in a format convenient for later processing or output operations.
M and vendor products to accomplish that particular set of tasks.

 single-image mode. Contrast with physically partitioned (PP) configuration.

rvices on the system but does not provide signalling services between z/OS systems. See multisystem sysplex.
s system. The SMPCSI DD statement refers specifically to the CSI that contains the global zone. This is also called the master CSI.

ose networks. The individual SNA networks retain their independence.

sibly, associated documentation concerned with the operation of a data processing system. For example, compilers, library routines, manuals, circuit diagra

tion of the job that created the data set.
destination. In IBM 6611 data link switching, for example, SNA frames are encapsulated into TCP/IP packets for transport across a non-SNA wide area netw

ng or output operations.
LU session. Currently, only an LU 6.2 can be an independent LU.
lp initiate LU-LU sessions.
 is used to initiate and terminate cross-domain LU-LU sessions.

cate with each other.
options can be predefined or specified when VTAM is started.
X equivalent is a daemon.

nts on the network causes these states to change in a pre-determined way, providing a predictability and control to the OSPF routers on the network.

g daemons and must be updated manually.

h checkpoint restart.

evice that can meet those goals and requirements.
r a group of DASD, optical, or tape volumes treated as single object storage hierarchy.
ually or by using automated processes. The Storage Management Subsystem automates these processes for you, while optimizing storage resources. See
a allocation characteristics, performance and availability goals, backup and retention requirements, and storage requirements to the system through data c
onally, SCTP supports multihoming, in which one of the endpoints of the connection can have more than one IP address. For more informa

 a control unit.

ssible units (NAUs), links, and adjacent link stations (in attached peripheral or subarea nodes) that are addressable within the subarea share a common sub

epresented by two or more sets of addresses that are subsets of the network's range of addresses. (3) Synonymous with subnet .

 Examples are CICS and IMS.
ortions of the program that can run independently of the main task program and each other.
quivalent is a user in privileged, or supervisor, mode. (2) A system user who can pass all z/OS UNIX security checks. A superuser has the special rights an

d by the instruction.

ommunications, monitoring, and diagnostic functions to a central processor complex (CPC).
horized user command. All writes to the remaining functional device are logged. This allows for automatic resynchronization of both volumes when the volu

e host is attempting a TCP connection.

out. In z/OS, RRS can act as the system level syncpoint manager. A syncpoint manager is also known as a transaction manager, syncpoint coordinator, or a

of routines used by the link-edit utility to resolve unresolved external references.

d by a character from A to Z, a number from 0 to 9, or a *.
 customer workloads. See Parallel Sysplex.
plex must have connectivity to the sysplex couple data set. See couple data set.

es such as data sets and z/OS commands. The IBM Security Server is a product that uses the SAF interface.
her basic system functions.

rs, lines, spool offloaders and spool volumes) and other resources in a z/OS system.
ed distribution libraries to be installed. A system modification is defined by a set of modification control statements (MCSs).
z/OS systems. SMP/E consolidates installation data, allows more flexibility in selecting changes to be installed, provides a dialog interface, and supports dy

 of an installation.

ests, and providing directory support or other session services for network users. Multiple SSCPs, cooperating as peers, can divide the network into domain

ough, and controlling the configuration and operation of, networks. The layered structure of SNA allows the ultimate origins and destinations of information, 

nal wiring and cabling emerges from the tailgate and usually is routed underneath the raised floor.

e on a single tape cartridge or reel. See volume .

d from DLIBs during system generation, and the SYSMODs applied to the target system.
plished by a computer.

e (DSE), that connects a DCE to one or more other DCEs, or that connects a DSE to another DSE. (2) Any physical medium, such as a wire or microwave
ct as directly attached terminal users of that host.

unications volume, 1 000 000 000 000 bytes.
contains 20 bytes of data and the IPv6 header contains 40 bytes of data.

lications using cryptography.

dentials before the dial-up link can be established.


ot function in accordance with the client-server paradigm. Rather, it is simply the peer that responds to the request to set up a dial-up link.
datalink. This property is used to create a flow for applications that are latency sensitive.

ltiple destinations that use multiple connections. The two types of load spreading are inbound load spreading for inbound traffic and outbo

circuit technology roughly from 1965 to 1970. C, FORTRAN, Basic and Pascal are examples of third-generation languages still in use today.

easured in bits per second (bps), kilobits per second (Kbps), megabits per second (Mbps), or gigabits per second (Gbps).
ched stations. (2) A FDDI or IEEE 802.5 network with a ring topology that passes tokens from one attaching ring station (node) to another. (3) See local area

y database, which is fully replicated in each network node. A TDU contains information that identifies the following:

of acquisition or leasing, training, deployment, support, residual equipment values, return on investment, time to market, and so forth.

or internetwork protocol. TCP provides a reliable host-to-host protocol between hosts in packet-switched communications networks and in interconnected sy
as designed to facilitate communication between computers located on different physical networks.
oup of links between adjacent nodes. When a transmission group consists of a group of links, the links are viewed as a single logical link, and the transmiss
oute message units and to control their flow within the network. See path information unit.

ute for forwarding to the next node in the route.

and ISO TP4 transport protocols provide full-duplex virtual circuits on which delivery is reliable, error free, sequenced, and duplicate free. UDP provides no 

data three times. 3DES requires a key length of 168 bits. 3DES is also referred as Triple-DES.
ern world. It also supports many classical and historical texts in a number of languages. The Unicode standard has a 16-bit international character set defin

ce manager touches a protected resource on a node. A UR ends when the two-phase commit process for the ACID transaction changing it completes.

d administered. See hierarchical file system, zSeries® File System .


em was originally developed for use on minicomputers, but has been adapted for mainframes and microcomputers. The AIX operating system is IBM's imp

alog and facilitates volume portability.

ogram on one machine or process to send a datagram to an application program on another machine or process. UDP uses the Internet Protocol (IP) to de
n. USERMODs are identified by the ++USERMOD statement.

UPDATE, DELETE, or CREATE VIEW statement. A CTE is similar to a derived table in that it is not stored as an object and lasts only for the du
ect Model Jump .

e and modification level.

try standard protocol for a VPN is an architecture called IP Security Architecture (IPSec).
ection that is contained wholly within a subarea node for intranode sessions. A virtual route between distinct subarea nodes imposes a transmission priority

nto real addresses. The size of virtual storage is limited by the addressing scheme of the computer system and by the amount of auxiliary storage available
 The records in a VSAM data set or file can be organized in logical sequence by a key field (key sequence), in the physical sequence in which they are writ
running under z/OS. Now known as Communications Server - SNA Services.
 to a single read/write mechanism, for example, a drum, a disk pack, or part of a disk storage module. (3) A recording medium that is mounted and demoun

a set on the volume.

erations are suspended.

ness applications.

or example, TCP and UDP).

(LAN) or a metropolitan area network (MAN).

 the screen is filled and a new message is added, the separator line overlays the oldest message and the newest message appears immediately before the

rrecting. The operator must enter a response.
uage compilers.
hell interface. UNIX-skilled users can interact with the system, using a familiar set of standard commands and utilities. z/OS-skilled users can interact with 

th a default router for the block and is used with the Oracle Solaris Elastic Virtual Switch feature.
is known only to the recipient of the message. Public key cryptography is also known as asymmetric cryptography.
ess is created from the system's MAC address.

n of multiple hosts into multiple VMs or zones on a shared host.

link, uses asynchronous PPP communications.

sses and groups. However, Oracle Solaris IPv6 nodes can send traffic to anycast groups.

ost-to-host communication. InfiniBand is used in high-performance computing and enterprise data centers.
our hops away from each other.

Link aggregation is an L2 entity that includes DLMP aggregation and trunk aggregation.
datalink and flow statistics over a period of time in a log file. You can retrieve this data later for analysis.

kenmt and tswtclmt.


cket or repeated later. To protect against such attacks, a packet can contain a field that increments during the lifetime of the secret key that
nditions occur. When such changes occur, such as the addition of interfaces, you have to reconfigure the network for the system to adapt to

ations to users or other nodes on the network.


andled by every system. Multicast requires the routers to be configured with specific routing protocols such as Distance Vector Multicast Ro
reachability of the hosts on an IP network.
3 (OC3) and T carrier (T1) are common examples of leased-line media. Though easier to administer, leased-line links are more expensive th
provided by ISDN. The term “dial-up” refers to the sequence in link negotiation when the local modem dials up the remote peer by using t
e flowacct module in the IPQoS configuration file.

next line contains the response to be sent from the local host afer it receives the correct expect string from the peer. Subsequent lines rep
onform to the filters in its IPQoS configuration file. See packet filter.
nnected group of one or more IP prefixes and has a single and clearly defined routing policy. For more information, see RFC 1930 (http://to
hable by a cached link-layer address.

ized for applications where the key does not change ofen.

the Internet and connect two or more data lines from different networks. A router forwards a data packet from one router to another thro
of information and to avoid simultaneous transmission by two or more systems.
ent, for example, igb.

hanism. Oracle Solaris networking is a dual stack. This dual stack technique is supported on both hosts and routers.

r IPv6 networks. Dynamic routing is best used on large networks with many hosts.
e same community VLAN. Multiple community VLANs can be created within a primary VLAN domain.
er secondary VLAN. Only one isolated VLAN can be created within a primary VLAN domain.

obal uniqueness scope.


d of physical links for the purpose of constructing a private virtual network that is isolated from other virtual networks on the system, as w
orks are configured over etherstubs.
s. See also VNIC.
backup router assumes the role of a master router if the current master router fails. See also VRRP and VRID.
The master router controls the IPv4 or IPv6 address or addresses that are associated with the virtual router. The virtual router forwards th

thout any prior information. Asymmetric cryptographic key agreement is the basis of public key cryptography.
r the server can become overloaded and nonfunctional.
an automatic tunnel over an IPv4 without the need to configure explicit tunnels.
e used to establish a secure channel for symmetric key encryption. The Diffie-Hellman protocol is an example of an asymmetric key protoco
kernel zone.
d flow control. The connected devices use the highest performance transmission mode that they support.

erver can be used to prevent access to certain web sites.


del provides a simple and scalable mechanism for classifying and managing network traffic and providing IPQoS. The major modules are cla
d receive traffic on any interface in the group. Moreover, the set of data addresses in an IPMP group can be used continuously provided tha
dress can be marked DEPRECATED to prevent the address from being used as a source address.
nectivity. For more information about IPv4 private addresses, see RFC 1918 (https://tools.iet.org/html/rfc1918). For more information abou

prove network availability and utilization. The IPMP group, including all its underlying IP interfaces and data addresses, is represented by a
a broadcast address from a system on the local network is delivered to all systems on that network.
up. Multicast packets are received only by nodes that are subscribed to the multicast group, unlike broadcast which reaches all nodes.
o the nearest interface having that address. The packet's route is in compliance with the routing protocol's measure of distance.
r 12 bytes less of overhead than the IP in IP encapsulation.

mples of xADs include: BPAD=BAD+EAD; DPAD=MAD+PAD; and TAD.


ss transactions to move securely over the Internet.

s X12, HIPAA, EDIFACT, or CIDX. Each BAD combines with one EAD to constitute a BPAD.

onsists of one Business Attributes Definition (BAD) and one Enveloping Attributes Definition (EAD).
Way Intelligent Adapters, OTD Libraries, and Protocol Managers, as well as many other products.

siness electronically in the chemical industry. CIDX focuses on the development of eBusiness standards, called Chem eStandards.

one Messaging Attributes Definition (MAD) and one Packaging Attributes Definition (PAD).

ch as X12, HIPAA, EDIFACT, or CIDX. Each EAD combines with one BAD to constitute a BPAD.
tion profiles, business processes, and metadata registry.

/.../.... Specifications for HTTP include RFCs 2068, 2616, 2617, 2660, and 3310.
grator, various eWay Intelligent Adapters, OTD Libraries, and Protocol Manager Composite Applications, as well as many other products.
tional database in directory servers (informally called “LDAP servers”) accessed via TCP/IP. Specifications for LDAP include RFCs 1777-1779
2, ebXML, or RNIF. Each MAD combines with one PAD to constitute a DPAD.

and so forth. Specifications for MIME include RFCs 2045–2049.

ansform data interface with external systems.


ebXML, or RNIF. Each PAD combines with one MAD to constitute a DPAD.

to operate with other trading partners adhering to the same framework, allowing electronic business transactions to be conducted secure
or authentication, message integrity and non-repudiation and encryption for privacy and data security. Specifications for S/MIME version 2
essages exchanged electronically.
s for SMTP include RFCs 1651, 2821, and 3461.

the Internet.
veloping, and/or transport parameters to be used for sending and receiving B2B information.

ulary”) are open.


k stream. You define selectors in the filter clause of the IPQoS configuration file.
ys, and flexible configuration.

cally restarted when necessary.


roadcast addresses from remote locations.

mine whether a packet must be discarded, sent on the network, or protected with IPsec.

To engage in IP spoofing, the sender must first use a variety of techniques to find an IP address of a trusted host and then modify the pack
machines and is implemented in the hardware. The SR-IOV specification enables a virtual machine to be directly connected to the I/O dev
ver authentication, encryption of data in transit, and optional client authentication.
proxy is also known as KSSL.

ugh the firewall. By tracking and matching requests and replies, a stateful packet filter can screen for a reply that doesn't match a request.

IP address.
he message. Advanced Encryption Standard is an example of a symmetric key.

n address for data traffic.


s. TFTP is generally used for the automated transfer of configuration or boot files between systems in a local network. For more information
mputes the shortest-path information for each TRILL node in the network and uses that information to forward packets to individual destina
t of aggregated ports. The IEEE 802.3ad requires switch configuration, as well as switch-vendor proprietary extensions in order to work acro

mission channels or data paths. For more information, see RFC 768 (http://www.iet.org/rfc/rfc768.txt).

s to participate in large networks such as Usenet.

esources with the Physical Function and with other VFs that are associated with the same PF. VFs are only allowed to have configuration re

is inherited by the VNIC when it connects to the virtual port.


n the physical machine and does not send this traffic out on the wire. Virtual switches are automatically instantiated when VNICs are create

ver an underlying datalink to share it between multiple zones or virtual machines (VMs) or connect a VNIC to an elastic virtual switch.
ances belonging to a VRID.
ncers. For more information, see RFC 5798 (https://tools.iet.org/html/rfc5798).

Ns address the 4K limitation that is imposed when using VLANs. Typically, VXLANs are used in a cloud infrastructure to isolate multiple virtua

eptance criteria and to enable the user, customers or other authorized entity to determine whether or not to accept the system. [Afer IEE

ctionality testing.

ults and randomness guides the test execution activity.


ided for this purpose for the sofware considered. [ISO 9126] See also portability testing.
mphasizing the test-first design paradigm.
ment organization. Alpha testing is ofen employed as a form of internal acceptance testing.
entified. [ISO 9126] See also maintainability testing.
meone’s perception or experience. Anomalies may be found during, but not limited to, reviewing, testing, analysis, compilation, or use of s

ased on objective criteria, including documents that specify:

of discrepancies. [IEEE 610]


nd that can be changed only through a formal change control process. [Afer IEEE 610]

er or to a standard as in (1). [Afer IEEE 610]

as ‘best’ by other peer organizations.


her or not a component or system satisfies the user/customer needs and fits within the business processes. Beta testing is ofen employed
em, rather than in stages. [Afer IEEE 610] See also integration testing.
nt or system without reference to its internal structure.

level components. This process is repeated until the component at the top of the hierarchy is tested. See also integration testing.

or example the minimum or maximum value of a range.


ent coverage.

, e.g. case, jump, go to, ifhen- else.

planning, engineering and managing sofware development and maintenance. [CMM]


ation covers practices for planning, engineering and managing product development and maintenance. CMMI is the designated successor
er (i.e. replayed). These tools are ofen used to support automated regression testing.

ntatives of input and/or output domains. [Grochtmann]


cuted, e.g. statement coverage, decision coverage or condition coverage.
26] See portability testing.
omatic complexity.

onal behavior (e.g. resource-utilization).

by simultaneous execution, is handled by the component or system. [Afer IEEE 610]


cision statement to be tested as True and False.
condition determination coverage implies 100% decision condition coverage.

configuration items afer formal establishment of their configuration identification. [IEEE


haracteristics in technical documentation. [IEEE 610]
management process. [IEEE 610]
a configuration item, control changes to those characteristics, record and report change processing and implementation status, and verify

ditional testing is required and if so, which test cases are needed.

raph – N = the number of nodes in a graph – P = the number of disconnected parts of the graph (e.g. a calling graph and a subroutine). [Af

n the table. Data driven testing is ofen used to support the application of test execution tools such as capture/playback tools. [Fewster an
, or destruction. [Beizer]
mers to execute programs step by step, to halt a program at any program statement and to set and examine program variables.

s both 100% condition coverage and 100% decision coverage.

% statement coverage.

on table. [Veenendaal]

rms, e.g. lines-ofcode, number of classes or function points).

mpact. [Afer IEEE 1044]

a definition. A defect, if encountered during execution, may cause a failure of the component or system.
execution of a path (“predicate” use).

terfaces between components or systems).

s. [Afer IEEE 610]

coverage. [TMap]

to prevent a task from starting which would entail more (wasted) effort compared to the effort needed to remove the failed entry criteria.

e designed to cover each partition at least once.


est as a result of errors made, and to design tests specifically to expose them.
and removal, and estimating the number of remaining defects. [IEEE 610]

erform an action on data.


or other structural element.
it criteria is to prevent a task from being considered completed when there are still outstanding parts of the task which have not been finis

ew and better tests. [Bach]

ts, or complete termination of execution.


failures per number of computer runs. [IEEE 610]

cified interface. [ISO 9126] See also reliability.

[Afer IEEE 1008]

ement may be used as a basis for the measurement of productivity, the estimation of the needed resources, and project control.

out reference to its internal structure. See also black box test design technique.

ons. [ISO 9126]

and test procedure specification).


e to specified requirements.
ontrol the allocation, correction and re-testing of incidents and provide reporting facilities.
e impact. [Afer IEEE 1044]

ject requirements. The requirements are prioritized and delivered in priority order in the appropriate increment. In some (but not all) versi

o higher level documentation. The most formal review technique and therefore always based on a documented procedure. [Afer IEEE 610

rocedure, installation wizard, or any other similar process description.


es feedback on installation results, and prompts for options.

ut at the start of the test execution phase.


gration testing, system integration testing.

d. The keywords are interpreted by special supporting scripts that are called by the control script for the test. See also data driven testing.

tart of the linear sequence of executable statements, the end of the linear sequence, and the target line to which control flow is transferred

f transactions to determine what load can be handled by the component or system.

ance easier, or adapted to a changed environment. [ISO 9126]

ed environment. [IEEE 1219]


nt that monitors progress, determines the status of plans and schedules, confirms requirements and heir system allocation, or evaluates th
y Model, Test Maturity Model. (2) The capability of the sofware product to avoid failure as a result of defects in the sofware. [ISO 9126] Se

ogram to fail due to lack of memory.

havior of the component or system. [Afer IEEE 610]


dition coverage implies 100% condition determination coverage.

tants) of the program.


roach or test design technique. [Afer Beizer].

nclude operating systems, database management systems, and other applications.


e computer. This implicitly means ongoing real-time code reviews are performed.

r testing. [CMMI]
can simulate either multiple users or high volumes of input data. During execution, response time measurements are taken from selected t

put rate. [Afer IEEE 610] See efficiency.

ments, including the constraints of time, cost and resources. [ISO 9000]

establishment of the quality policy and quality objectives, quality planning, quality control, quality assurance and quality improvement. [IS

file. This technique can be used for testing non-functional attributes such as reliability and performance.

9126] See also reliability.


the sofware, as a result of the changes made. It is performed when the sofware or its environment is changed.
bly other stakeholders, at the start of a test execution phase. [Afer IEEE 829]

r of operations. [ISO 9126]


O 9126] See also portability.
ent to satisfy a contract, standard, specification, or other formally imposed document. [Afer IEEE 610]
ceability through layers of requirements and requirements change management. Some requirements management tools also provide facil

cise specific functions or probe non-functional attributes such as reliability or usability.


y used by the program and the sizes of required temporary or overflow files, when the sofware performs its function under stated conditi
ut. See also actual result, expected result.

anagement review, informal review, technical review, inspection, and walkthrough. [Afer IEEE 1028]
present different viewpoints and roles in the review process.

0] See also errortolerance, fault-tolerance.

pecified context of use. [ISO 9126]

has to make ensure that the logging form is readable and understandable.

puts. [Afer IEEE 610, DO178b] See also emulator.


ns of a program work, but not bothering with finer details. A daily build and smoke test is among industry best practices. See also intake tes

mponent or system, and, ofen, the procedures for determining whether these provisions have been satisfied. [Afer IEEE 610]

hange from one state to another. [IEEE 610]

trics or data flow anomalies.


al profile testing.
his information includes a listing of the approved configuration identification, the status of proposed changes to the configuration, and the i

n it. It replaces a called component. [Afer IEEE 610]

eer review. [Gilb and Graham, IEEE 1028]


nd the risk assessment carried out, starting points regarding the test process, the test design techniques to be applied, exit criteria and tes

document can be amended only by way of formal amendment procedure, then the test basis is called a frozen test basis. [Afer TMap]

, such as to exercise a particular program path or to verify compliance with a specific requirement. [Afer IEEE 610]

est. Test comparison can be performed during test execution (dynamic comparison) or afer test execution.
ural element.

cases. [Afer IEEE 829]

ts management tool, or from specified test conditions held in the tool itself.

and lessons learned.


up of test preconditions, and other test control and reporting functions.
t is evaluated to determine whether or not requirements have been satisfied. [IEEE 610]
which they are to be executed.

e component test, integration test, system test and acceptance test. [Afer TMap]

of a test object.
effective test process.
nchmark), a user manual, or an individual’s specialized knowledge, but should not be the code. [Afer Adrion]
ves, e.g. Defect Detection Percentage (DDP).

to be tested, the testing tasks, who will do each task, degree of tester independence, the test environment, the test design techniques and

sting and acceptance testing.

n and test analysis. [TMap] See also CAST.


pecific test objective, i.e. reliability test, usability test, regression test etc., and may take place on one or more test levels or test phases. [Af
s. [Afer TMap]

to determine whether the requirements have been met. [Afer IEEE 610]

and related work products to determine that they satisfy specified requirements, to demonstrate that they are fit for purpose and to detec
up and clear-up procedures, files, databases, environment, and any additional sofware or utilities used in testing. [Afer Fewster and Graha
ments, as opposed to the integration of components by levels of a hierarchy.
nents being simulated by stubs. Tested components are then used to test lower level components. The process is repeated until the lowest
tical traceability.
s facilitates defect analysis and allows a process audit to be carried out. [Afer TMap]
s and conditions of use. [ISO 9126] See also usability.

ed conditions. [Afer ISO 9126]

n fulfilled. [ISO 9000]

w testing activities can be integrated into each phase of the sofware development life cycle.
reedman and Weinberg, IEEE 1028]

ance is usually preceded by change evaluation or testing and is ofen required before proceeding to the next stage of a project or process. S
t the confidentiality, integrity and availability of assets by ensuring that only authorized users are able to access or modify the assets. Acces
ed by type III service providers when dealing with external customers.
ging variance from the budget.

so passive monitoring.

ract. See also operational level agreement; service level agreement.


d managed by system management tools and are managed by the event management process.
ces or other configuration items. Analytical models are commonly used in capacity management and availability management. See also mo
on one or more servers or clients. See also application management; application portfolio.

attributes of all applications. The application portolio is sometimes implemented as part of the service portolio, or as part of the configura
e applications by network connections to the service provider.
n existing application. Application sizing helps to ensure that the IT service can meet its agreed service level targets for capacity and perfor
. Architecture also includes the standards and guidelines that guide the design and evolution of the system.
mory etc.; an IT service CI may contain many hardware, sofware and other CIs. See also build; component configuration item.
ness targets are being met. See also audit.
ets can be one of the following types: management, organization, process, knowledge, people, information, applications, infrastructure, or
See also service asset and configuration management, fixed asset management, sofware asset management.

sset for other purposes.


ecorded in the configuration management database (CMDB) and maintained as part of a configuration management system (CMS). See als
d effectiveness targets are being met. An audit may be carried out by internal or external groups. See also assessment; certi

e. ACD is sometimes called automated call distribution.


bility, maintainability, serviceability, performance and security. Availability is usually calculated as a percentage. This calculation is ofen bas
lability management is responsible for ensuring that all IT infrastructure, processes, tools, roles etc. are appropriate for the agreed service

when a change or release is not successful.

recard enables a strategy to be broken down into key performance indicators. Performance against the KPIs is used to demonstrate how we
time but only some will be used as baselines. For example: An ITSM baseline can be used as a starting point to measure the effect of a ser
pshot of a process can be compared to a previous baseline of that process, or a current baseline can be compared to industry data or best
best practice. The term is also used to mean creating a series of benchmarks over time, and comparing the results to measure progress or i

at a later stage. Brainstorming is ofen used by problem management to identify possible causes.
lso International Organization for Standardization.
eting; planning.
nual) and the day-to-day monitoring and adjusting of current budgets.
ase that is authorized for distribution – for example, server build or laptop build. See also configuration baseline.
environment.
sector and not-for-profit organizations, as well as companies. An IT service provider provides IT services to a customer within a business. T
uture business requirements for use in the capacity plan. See also service capacity management; component capacity management.
ks and possible problems. See also cost benefit analysis.
guards the interests of key stakeholders, reputation, brand and value-creating activities. The process involves reducing risks to an acceptabl
vocation, people to be involved, communications etc. IT service continuity plans form a significant part of business continuity plans.
mer is someone who buys a car.
dencies. These dependencies may include suppliers, people, other business processes, IT services etc. Business impact analysis defines the
nce for the IT strategy, and are ofen supported by IT services.

ding of the business from the point of view of the service provider.
er. For example, a retailer may have a purchasing process that helps to deliver services to its business customers. Many business processes
identifies customer needs and ensures that the service provider is able to meet these needs with an appropriate catalogue of services. Thi
manager role.
he customers of a retail store. Successful delivery of business services ofen depends on one or more IT services. A business service may co

eate value for customers in the form of goods and services.

ties are intangible assets of an organization. See alsoresource.


gineering Institute (SEI) of Carnegie Melon University, US. CMMI provides organizations with the essential elements of effective processes.
me, for example a disk drive.
targets in a cost-effective and timely manner. Capacity management considers all resources required to deliver the IT service, and plans for

ge of IT services and components, any issues that need to be addressed and related improvement activities. The plan also contains scenari

of the asset is depreciated over multiple accounting periods.

ccounting periods. The most common example of this is sofware development, or purchase of a sofware licence.
group similar types of cost. Incident categories are used to group similar types of incident, while CI types are used to group similar types o
lso used to mean awarding a certificate to provide evidence that a person has achieved a qualification.
all architectures, processes, tools, metrics and documentation, as well as changes to IT services and other configuration items.
d is usually made up of representatives from all areas within the IT service provider, representatives from the business, and representatives
elp determine whether to authorize the change.
at apply to the CI.
neficial changes to be made, with minimum disruption to IT services.
wed for a change of this category. Change models may be very simple, with no requirement for authorization (e.g. password reset), or may
ng with a corresponding business case and an expected implementation schedule. Change proposals are normally created by the service po
reated for every request for change that is received, even those that are subsequently rejected. Change records should reference the config

erm changes. A change schedule is sometimes called a forward schedule of change, even though it also contains information about change
sually documented in service level agreements.
vider as a cost centre.
changes are documented in a charter and authorized by service portolio management. Charters are passed to the service design lifecycle s
ate and time to provide a detailed timeline. This can make it possible to identify which events may have been triggered by others.
guration record. Common CI types include hardware, document, user etc.
problems, changes etc. are usually classified.
lationship manager. The term is also used to mean: l A computer that is used directly by a user – for example, a PC, a handheld computer o

nagement of IT processes. COBIT is published by the IT Governance Institute. See www.isaca.org for more information.
on. The code of practice describes recommended best practice.

n application may be a component of a release unit. Components that need to be managed should be configuration items.
and performance of configuration items. Data is collected, recorded and analysed for use in the capacity plan. See also business capacity m

T services on one axis and CIs on the other. This enables the identification of critical CIs (that could cause the failure of multiple IT services
t is most commonly used to refer to systems where an application displays detailed screens relating to incoming or outgoing telephone cal

t of an IT service. Configuration is also used to describe the parameter settings for one or more configuration items.
figuration baseline is used as a basis for future builds, releases and changes.
e, by submitting a request for change or service request.
n into the configuration management database. Configuration identification is also responsible for labelling the configuration items themse
uration item is recorded in a configuration record within the configuration management system and is maintained throughout its lifecycle b
elationships. This information is managed throughout the lifecycle of the configuration item. Configuration management is part of an overa
or more configuration management databases, and each database stores attributes of configuration items, and relationships with other co
anagement system is part of an overall service knowledge management system and includes tools for collecting, storing, managing, updatin
on item. Configuration records are stored in a configuration management database and maintained as part of a configuration management

ment is responsible for managing improvements to IT service management processes and IT services. The performance of the IT service pro

though the IT service is available.

dures, roles, RAID, door locks etc. A control is sometimes called a countermeasure or safeguard. Control also means to manage the utilizatio

es on the same IT service, process etc., allowing different individuals or teams to focus on what is important and relevant to their specific ro

pporting service.

) and depreciation.
case; internal rate of return; net present value; return on investment; value on investment.
can be run as a cost centre or a profit centre.
example, a cost type of ‘people’ could have cost elements of payroll, staff benefits, expenses, training, overtime etc. Cost elements can be
accommodation, external and transfer. See alsocost element; cost unit.
rs, sofware licences) or things easily measured (e.g. CPU usage, electricity consumed). Cost units are included within cost elements. For ex
tives at minimum cost. See also key performance indicator; return on investment; value for money.
bility of an IT service.
itoring progress.
amm.com for further information.
or strategic issues such as managing media relations and shareholder confidence, and decides when to invoke business continuity plans.
the achievement of each critical success factor. For example, a critical success factor of ‘protect IT services when making changes’ could be

e also vision.
s. The term is also sometimes informally used to mean user – for example, ‘This is a customer-focused organization.’
mers. Each IT service delivered to a customer should have a contract or other agreement that is listed in the customer agreement portolio
ate one or more outcomes desired by the customer. All live customer-facing services, including those available for deployment, are recorded
relationship manager’s view of the customers who receive services from the IT service provider. See also customer agreement portolio; se
d can also be included in management reports and web pages. Dashboards can be used to support service level management, event mana

e definitive media library may also contain associated configuration items such as licences and documentation. It is a single logical storage
a planned output of any process.
emand management can involve analysis of patterns of business activity and user profiles. At a tactical level, it can involve use of differentia

ent. Deployment is part of the release and deployment management process.


useful economic value.
o service design.
nsistent and effective design of new or changed IT services, service management information systems, architectures, technology, processes
omatic or the result of a user logging an incident.
rocess is not described in detail within the core ITIL publications. Development is also used to mean the role or function that carries out de
same degree of control as test or live environments. See alsodevelopment.
ause of a problem.
ve and assign incidents. Diagnostic scripts may also be made available to users to help them diagnose and resolve their own incidents.
ces. For example, reduced charges outside peak times, or increased charges for users who exceed a bandwidth allocation.
ost of providing non-shared servers or sofware licences. See also indirect cost.

r diagram of a computer room layout. See also record.


lability of an IT service is ofen calculated from agreed service time and downtime.

support, the service provider reviews key performance indicators, service levels and monitoring thresholds and may implement improvem
of scope.
a new IT service from an existing IT infrastructure. See alsoeconomies of scale.
activity is one that achieves its agreed objectives. See also key performance indicator.
cient process achieves its objectives with the minimum amount of time, money, people or other resources. See also
The change management process will normally have a specific procedure for handling emergency changes. See also
cided at the time a meeting is called, and depends on the nature of the emergency change.
nvironment. Also used in the term ‘physical environment’ to mean the accommodation, air conditioning, power system etc. Environment is
person or a faulty process that impacts a configuration item is also an error.
alation may be needed within any IT service management process, but is most commonly associated with incident management, problem
ed by Carnegie Mellon University, US. See also e-sourcing capability model for service providers.
was developed by Carnegie Mellon University, US. See also e-sourcing capability model for client organization
heapest and least accurate modelling method.
o mean an alert or notification created by any IT service, configuration item or monitoring tool. Events typically require IT operations person

ples include service level agreement targets being missed or about to be missed, and a performance metric indicating a potential capacity p
s used to help understand all contributions to the impact of incidents and to plan for how these could be controlled or reduced.

ed to customers. See also internal metric.


external customers. See also Type III service provider.

ncludes all aspects of managing the physical environment – for example, power and cooling, building access management, and environmen
processes, activities, configuration items etc. A failure ofen causes an incident.
ay up to the effect on the business. Failure modes and effects analysis is ofen used in information security management and in IT service c
nd sofware configured ready to run the IT services. Fast recovery typically takes up to 24 hours but may be quicker if there is no need to re

so countermeasure; resilience.
y cause an incident in the future. Fault tree analysis represents a chain of events using Boolean notation in a diagram.

r has more time or other resources. See also escalation.

r purpose requires suitable design, implementation, control and maintenance. See also utility.
nse. See also service asset; configuration item.
t management maintains the asset register and is usually carried out by the overall business, rather than by the IT organization. This proces

very option.
problems and service requests are passed between groups in different time zones.

two other meanings:

re a set of requirements with actual delivery. See also benchmarking.


s and responsibilities, measuring and reporting, and taking actions to resolve any issues identified.
ntal support and network cabling, but no computer systems. The hardware and sofware are installed as part of the IT service continuity pl
 standard.
ovide a single point of contact for all interaction. The term is ofen used as a synonym for service desk.

lity solutions are designed to achieve an agreed level of availability and make use of techniques such as fault tolerance, resilience and fast

mple identities might be the username SmithJ or the role ‘change manager’.
ecovery typically uses mirroring, load balancing and split-site technologies.
how service levels will be affected. Impact and urgency are used to assign priority.
ot yet affected service is also an incident – for example, failure of one disk from a mirror set.
he IT service to customers as quickly as possible.
red servers or sofware licences. Also known as overhead. See also direct cost.
nformation security management usually forms part of an organizational approach to security management that has a wider scope than th
tion security management objectives. See also security management information system.

ons, applications and other sofware. The information may include business data, voice, images, video etc. Information technology is ofen

nsiders all possible causes of modification, including sofware and hardware failure, environmental events, and human intervention.
destination for incoming calls.
s computer systems and network components. The hardware and sofware will need to be configured, and data will need to be restored, a

processes. Internal metrics are not normally reported to the customer of the IT service. See also external metric.
stments to be compared. A larger internal rate of return indicates a better investment. See also net present value; return
ernal customers. See also in-sourcing; Type I service provider; Type II service provider.
er; Type II service provider.
a network of the national standards institutes of 156 countries. See www.iso.org for further information about ISO.

ed by Kaoru Ishikawa, the output of this technique is a diagram that looks like a fishbone.
ation. See also International Organization for Standardization.

/IEC 17799. See also standard.


y used in UK government departments.
ices. The term includes all of the information technology but not the associated people, processes and documentation.
rovision of quality IT services, and on the processes and facilities needed to support them. See www.itil.co.uk for more information.
d output management. IT operations is also used as a synonym for service operation.

infrastructure. IT operations management includes IT operations control and facilities management.


r-facing IT service directly supports the business processes of one or more customers and its expected outcomes should be defined in a ser
e IT service provider can always provide minimum agreed service levels, by reducing the risk to an acceptable level and planning for the re
o be involved, communications etc. The IT service continuity plan should be part of a business continuity plan.
providers through an appropriate mix of people, process and information technology. See also service management.
itSMF is a not-for-profit membership organization with representation in many countries around the world (itSMF chapters). The itSMF and

cludes senior representatives from the business and the IT service provider.
oles – for example, the roles of configuration manager and change manager may be carried out by one person.
y IT operations management, and is ofen automated using sofware tools that run batch or online tasks at specific times of the day, week,
f an IT service grouped into areas such as basic factors, excitement factors, performance factors etc.
when and extent. Possible causes are identified, the most probable cause is tested, and the true cause is verified.
rformance indicators are used to measure the achievement of critical success factors. Many metrics may be measured, but only the most im
the right place and at the right time. The knowledge management process enables informed decisions, and improves efficiency by reducin
ycle by problem management. Known errors may also be identified by development or suppliers.
blem management. The known error database may be part of the configuration management system, or may be stored elsewhere in the se
he status, root cause and workaround. In some implementations, a known error is documented using additional fields in a problem record.
e status transitions that are permitted. For example:
each service level package is designed to support a particular market segment.

. Maintainability is ofen measured and reported as MTRS. Maintainability is also used in the context of sofware or IT service developmen

e various IT service management processes. Management information ofen includes the values of key performance indicators, such as ‘pe
ct on the achievement of an organization’s business objectives. See www.m-o-r.org for more details.
s objectives. This term is also with a smaller scope to support a specific process or activity – for example, event management system or risk
operates without the use of IT services. This is a temporary measure and is usually combined with another recovery option.
dditional user.
he possible IT services that an IT service provider may wish to consider delivering.
processes and functions are formally aligned to business objectives and strategy, and are supported by a framework for continual improvem

m its agreed function without interruption. This is measured from when the configuration item starts working, until it next fails.
TBSI is equal to MTBF plus MTRS.
until it is repaired. MTTR does not include the time required to recover or restore. It is sometimes incorrectly used to mean mean time to re
until it is fully restored and delivering its normal functionality. See alsomaintainability; mean time to repair.
erformance indicator.
than developed within the IT service provider. See also off the shelf.
at is to be achieved, but not how this should be done.

ncial management, capacity management and availability management.


nd taking appropriate action based on this comparison.

f supporting functions such as a service desk. See also off-shore; on-shore.


sent value indicates that an investment is worthwhile. See also internal rate of return; return on investment.
ment process.

oney is actually transferred. Notional charging is sometimes introduced to ensure that customers are aware of the costs they incur, or as a
as measurable targets. The term is also informally used to mean a requirement. See also outcome.

ment and in raising levels of procurement skills and capability within departments. It also provides support for complex public sector proje
he provision of an IT service, or of supporting functions such as a service desk. See also near-shore; on-shore.

e or more operations. For example, to operate a computer is to do the day-to-day operations needed for it to perform as expected.
tivity or transaction – for example, loading a magnetic tape, accepting money at a point of sale, or reading data from a disk drive.
ing or delivery of a business process or IT service management process. The term is also a synonym for live.
tricity (also known as current expenditure or revenue expenditure). See also capital expenditure.
orts the IT service provider’s delivery of IT services to customers and defines the goods or services to be provided and the responsibilities o

ated by using the resources in a different way. For example, the opportunity cost of purchasing a new server may include not carrying out a

, a project or business unit.


ctual results. See also objective.

on the number of users affected, the duration of the downtime, the impact on each user, and the cost to the business (if known).
e effort. Pareto analysis is also used in problem management to prioritize possible problem causes for investigation.
d have a partnership with the business and with third parties who are critical to the delivery of IT services. See also
. See also active monitoring.
and and plan for different levels of business activity. See also user profile.
0 seconds in a one-hour period, its utilization is 50%.

ology enablement, performance management and innovation.


ction, performance analysis and tuning, and implementing changes related to performance and capacity.
ser feedback and acceptance. See also change evaluation; test.
or process. ISO/IEC 20000 requires a plan for the management of each IT service management process.
eming Cycle. Plan – design or revise processes that support the IT services; Do – implement the
e also change window; downtime.

elopment and implementation of processes, standards, roles, activities, IT infrastructure etc.


ontinuity plan. See also fixed facility; recovery option.
portunities for improvement.
o best practice.
output from one process that is a required input to another process.

Management Body of Knowledge.


mpact and urgency, and is used to identify required times for actions to be taken. For example, the service level agreement may state that P

to identify problems that might otherwise be missed. Proactive problem management analyses incident records, and uses data collected b
agement process is responsible for further investigation.
ent incidents from happening, and to minimize the impact of incidents that cannot be prevented.

utputs. It may include any of the roles, responsibilities, tools and management controls required to reliably deliver the outputs. A process m

tivities required to carry out, monitor and report on the process. There may be several process managers for one process – for example, reg
ent and continual improvement of the process and its metrics. This role can be assigned to the same person who carries out the process m

costs, or running at a loss. An IT service provider can be run as a cost centre or a profit centre.
typically includes initiation, planning, execution, closure etc. Projects are usually managed using a formal methodology such as PRINCE2 or
so PRINCE2.

See also validation.
ity if it performs as expected and delivers the required reliability. Process quality also requires an ability to monitor effectiveness and effici
Quality assurance is also ofen used to refer to a function or team that performs quality assurance. This process is not described in detail w
suitable quality to reliably meet business objectives or service levels. See also ISO 9000.
y small cost and effort. See also pareto principle.
consulted and informed.
ogging an incident when an error occurs. See also proactive monitoring.
g facilities or computer room space.
e paper or electronic – for example, an audit report, an incident record or the minutes of a meeting.
vering data to a known consistent state. Afer recovery, further steps may be needed before the IT service can be made available to the use
t, gradual recovery, intermediate recovery, fast recovery, immediate recovery. Recovery options may make use of dedicated facilities or thir
pressed as a length of time before the failure. For example, a recovery point objective of one day may be supported by daily backups, and u
ess than normal service level targets. Recovery time objectives for each IT service should be negotiated, agreed and documented.

er and the business. In configuration management, it is a link between two configuration items that identifies a dependency or connection

ware, sofware, documentation, processes and other components.


ew functionality required by the business while protecting the integrity of existing services.
ation item and a version number – for example, Microsof Office 2003 SR2.

l be followed for a service request of this category. See also request fulfilment.
include one or more release units.
e process is also used as a synonym for the release and deployment management process.
y the release. Release records may be in the configuration management system or elsewhere in the service knowledge management system
orm a useful function. For example, one release unit could be a desktop PC, including hardware, sofware, licences, documentation etc. A d

without interruption. Usually measured as MTBF or MTBSI. The term can also be used to state how likely it is that a process, function etc. w
ns, or other actions designed to enable the business process to continue.

onically. The term is ofen misused to mean a change record, or the change itself.

s for a process. See also statement of requirements.


ple, an armoured cable will resist failure when put under stress. See alsofault tolerance.
n process is the process group that includes incident and problem management.

are considered to be assets of an organization. See also capability; service asset.


and in incident management as a measure of the time taken to answer the phone, or to start diagnosis.
vider responds to an incident or request for change etc.
dent management.
cle of many configuration items.
ome by the total value of assets. See also return on investment.
ofit of an investment divided by the net worth of the assets invested. See alsonet present value; value on investment
tre has been in use, then this phase will bring the primary data centre back into operation, and restore the ability to invoke IT service contin
closure. The purpose of a review is to ensure that all deliverables have been provided, and to identify opportunities for improvement. See a

rability of the asset to that threat, and the impact it would have if it occurred. Risk can also be defined as uncertainty of outcome, and can
e each asset is to those threats. Risk assessment can be quantitative (based on numerical data) or qualitative.
overall process afer risks have been identified and assessed, as in “risk assessment and management”. This process is not described in det
have multiple roles, for example the roles of configuration manager and change manager may be carried out by a single person. Role is also

e failures. See also service failure analysis.

de all live IT services and related configuration items; the scope of an ISO/IEC 20000 certificate may include all IT services delivered out of
el contains more specialist skills, or has more time or other resources.

tion system is part of the information security management system. See also service knowledge management system.

oach separates what is to be done from how it is to be done.

e also IT service.
er is ready to operate the new IT service when it has been deployed. See also acceptance.
figuration items, and the dependencies of IT services on configuration items.

ble information about those assets is available when and where it is needed. This information includes details of how the assets have been
pacity of IT services. The resources used by each IT service and the pattern of usage over time are collected, recorded and analysed for use
e catalogue is part of the service portolio and contains two types of IT services: customer-facing services that are visible to the business; a

a legal contract or a service level agreement. See also customer agreement portolio.

ore ITIL publications. See also design.


s produced for each new IT service, major change or IT service retirement.
quests, and also handles communication with the users.
to improve the IT service provider’s processes and tools, and not just the IT infrastructure. It is a time-constrained, project-like activity, rath
iday 08:00 to 17:00 except public holidays’. Service hours should be defined in a service level agreement.

stem includes the configuration management system, as well as other databases and information systems. The service knowledge managem

es the IT service, documents service level targets, and specifies the responsibilities of the IT service provider and the customer. A single agre
t. It is responsible for ensuring that all IT service management processes, operational level agreements and underpinning contracts are app
f a particular pattern of business activity. See also line of service.
usiness objectives and used to negotiate agreed service level targets.
n service level requirements, and are needed to ensure that the IT service is able to meet business objectives. They should be SMART, and

tems necessary to manage the full lifecycle of IT services. The service management lifecycle approach considers the strategy, design, transi
r a senior manager with responsibility for IT services overall.
ervice (how the configuration items fit together) and the dynamics of the service (activities, flow of resources and interactions). A service m
the core ITIL publications. See also operation.
mental in the development of service strategy and are responsible for the content of the service portolio. See also business relationship ma
kage and one or more core services and supporting services.
o customers. The service pipeline provides a business view of possible future IT services and is part of the service portolio that is not norm
f all services, and includes three categories: service pipeline (proposed or in development), service catalogue (live or available for deploym
ness value that they provide.

abbreviation for IT service provider. See also Type I service provider; Type II service provider; Type III serv
aces helps to coordinate end-to-end management of IT services.
r improve quality.
vice reporting should agree the format, content and frequency of reports with customers.
rd or to install a workstation for a new user. Service requests are managed by the request fulfilment process, usually in conjunction with th
ervice sourcing also means the execution of this strategy. Service sourcing includes:

the core ITIL publications. See also transition.


IT service matches its design specification and will meet the needs of the business.
n is used to help the business and the IT service provider agree on the value of the IT service.
reed levels of reliability, maintainability and availability for a configuration item.
present and implement improvements. The performance of the IT service provider is continually measured and improvements are made to
perations control personnel to support an IT service that is used 24 hours a day.
guration item. A simulation model is ofen created by using the actual configuration items that are being modelled with artificial workloads
or an IT service provider is usually called a service desk.
le point of failure may be a person or a step in a process or activity, as well as a component of the IT infrastructure. See also
targets. A SLAM chart is typically colour-coded to show whether each agreed service level target has been met, missed or nearly missed du
hould be specific, measurable, achievable, relevant and time-bound.
c point in time. Snapshots can be captured by discovery tools or by manual techniques such as an assessment. See also baseline; benchma
e asset management is part of an overall service asset and configuration management process.

Many public standards consist of a code of practice and a specification. The specification defines the standard against which an organization
verables. Stakeholders may include customers, partners, employees, shareholders, owners etc. See also RACI.
vernment standard for how financial records should be maintained. The term is also used to refer to a code of practice or specification pub
ord reset or provision of standard equipment to a new employee. Requests for change are not required to implement a standard change, an

s. For example, a standby data centre may be maintained to support hot standby, warm standby or cold standby arrangements.
nd long-term planning to achieve the overall vision.

vices and the management of those services. Once the strategy has been defined, strategy management is also responsible for ensuring th
r users typically provide support for minor incidents and training.
pliers include commodity hardware and sofware vendors, network and telecom providers, and outsourcing organizations.

their contractual commitments.


e product or service. See also value network.
nt processes. See also technical management.
s available. Support hours should be defined in a service level agreement, and may be different from service hours. For example, service ho
For example, a directory service or a backup service. Supporting services may also include IT services only used by the IT service provider.
opportunities and threats that it faces. SWOT stands for strengths, weaknesses, opportunities and threats.

hieve specific objectives, typically over a period of weeks to months.


mes when analysing and comparing strategies. The term is also used to refer to the activity of assigning tags to things.
al management defines the roles of support groups, as well as the tools, processes and procedures required.
staff meet to monitor the behaviour and performance of an IT service and make recommendations for improvement.

are designed to ensure that an appropriate balance is achieved.

also acceptance; service validation and testing.

aintenance company. Requirements for third parties are typically specified in contracts that underpin service level agreements. See also un
contains more specialist skills, or has more time or other resources.
hat could exploit the vulnerability of flammable floor coverings. This term is commonly used in information security management and IT se
hin four hours’, ‘More than five sof disk errors in an hour’, or ‘More than 10 failed changes in a month’.
or 200 disk I/Os per second.
the initial cost or purchase price. See also total cost of utilization.
st to the customer of using an IT service. See also total cost of ownership.
ement establishes a culture involving all people in the organization in a process of continual monitoring and improvement.
e numerous additions, deletions and modifications of data. Either all of these are completed successfully or none of them is carried out.

vice transition processes are change management, service asset and configuration management, release and deployment management, se
on failures or fragile configuration items, and in capacity management as a modelling tool to predict future behaviour. It is also used as a m
es and components. Tuning is also called optimization, particularly in the context of processes and other non-technical resources. Tuning is

T service to a customer. The underpinning contract defines targets and responsibilities that are required to meet agreed service level target
or of a single transaction.
For example, a high-impact incident may have low urgency if the impact will not affect the business until the end of the financial year. Impa
requirements.
ibe interactions between users and an IT service or other system.

and can be used to determine whether a service is able to meet its required outcomes, or is ‘fit for purpose’. The business value of an IT se
tion ensures that business requirements are met even though these may have changed since the original design. See also
previous steps and contributes to the overall product or service. See also value network.
nefit analysis.
information, goods or services. See also partnership; value chain.
gible benefits. See also return on investment.
ething else that cannot be fixed in advance. See also variable cost dynamics.
vision of IT services.
ce level management, but could apply in any area where plans are in place.
matches its design specification. See also acceptance; validation; service validation and testing.
ration items have been identified and recorded. Verification includes routine checks that are part of other processes – for example, verifyin
he sequence or date of each baseline to be identified. For example, payroll application version 3 contains updated functionality from versio
ure and strategic planning.
usiness continuity management, IT service continuity management and availability management.
ssing control is also considered to be a vulnerability.

ment or contract, or may be a marketing message or brand image. Warranty refers to the ability of a service to be available when needed, t

e detail than a procedure and is only created if very detailed instructions are needed.
starting a failed configuration item. Workarounds for problems are documented in known error records. Workarounds for incidents that do
he IT service. This is used to assist in analysing and managing the capacity, performance and utilization of configuration items and IT service
a continuous stream of data and 3270 Information Display System control elements in character form.

nsumption, and less heat. This makes ARM processors ideal for small battery powered devices. See ARM architecture Jump .

(or above) server. See What's New in AD DS: Active Directory Web Services Jump .
es, SQL Server databases, and even text files.

ore information, see RFC 826 (http://tools.iet.org/html/rfc826).

tains user data and programs, as well as system data and programs, some of which are common to all address spaces. See virtual address space, data sp

 ease of connection, reconfiguration, and adaptive route selection; (c) dynamic definition of network resources; and (d) automated resource registration and

ma. See Active Directory: Ambiguous Name Resolution.

re it can access restricted functions, such as supervisor calls (SVC) or SVC paths.
o send and receive directory search requests, and to obtain management services. An APPN end node can also attach to other end nodes. See Advanced

h as ATM Forum UNI 3.1.
ailability time. Scheduled outages (no service periods) are not counted against the availability measurement. A service may be unavailable even though the 

the Office binary file formats Jump .


ed as a bus or as a ring. (3) In a wide area network, a high-speed link to which nodes or data switching exchanges (DSEs) are connected.
d it remains in central storage to completion. Contrast with foreground.

re are essentially equal.

n asynchronous transfer mode (ATM), the capacity of a virtual channel, expressed in terms of peak cell rate (PCR), sustainable cell rate (SCR), and maximu

 in a smaller space of storage.

ut/output devices.
ement cabinets.

riage return occurred.
 trying again.

ater broadcasts for the same information.
ue digital certificate.

e caller to prove its identity.

4-channel computer, 64 streams of data are transferred simultaneously. In contrast, the bus in a desktop computer is a shared channel between all devices
figuration Service Provider.

 assignment of hexadecimal identifiers to graphic characters.

resources: ignore a new function; terminate gracefully; support a new function.

Intermediate between assembly language and modern programming languages. Formerly called Microsof Intermediate Language, or MSIL
hitectures. The .NET Framework is an implementation of CLI. See Common Language Infrastructure Jump .
ole of the Claim Rule Language Jump .
ces (APIs) that may be called concurrently and that are designed for client/server and distributed application programs. Communications Server includes th
can be addressed and accessed by other authorized host application programs without any need to copy the data.

messages. Also called compiler-time options.

centration) or extracts individual messages from the data sent in a single transmission sequence (deconcentration).

 TCP application on one system to a TCP application on another system.
AM transmits to or from disk. A control interval always includes an integral number of physical records.

dentifying the job or describing its requirements to the operating system.
evice interfaces, and a power source. Controllers can be divided into segments, or grouped into subsystems. Synonymous with controller or device control 

cylinder number, HH is the two-digit head number, and R is the record number) and the length of the data. The key field contains the record's key.
ntains a number of control unit interfaces on its side, which can connect to objects below it such as controllers or other crossbars.

rocessed concurrently by user-written application programs.

ch periodically performs the tasks listed in the crontab file. The z/OS equivalent is a started task.
e, a data stream is used to send displays and to receive displays from a workstation device.
waiting for the availability of a resource that does not become available because it is being held by another process that is in a similar wait state.

rk. The flows of SSCP services between DLUR and DLUS are encapsulated in APPN formats and carried over a special pair of LU 6.2 sessions (referred to

s to be sent. (3) An external logical unit (LU) or application program to which messages or other data are directed.
l as manipulate the configuration diagram.

th broadcast search. Synonymous with directed search.
ry can have the same name. (POSIX.1). (3) A file that points to files and to other directories. (4) An index used by a control program to locate blocks of data

em. See recovery, backup, recovery system.

terogeneous platforms.

 to consider the physical location of the file. Files are part of a single, global namespace, so that a user can be found anywhere in the network by means of
t. For more information, see RFC 1034 (http://tools.iet.org/html/rfc1034).

ecause each character requires two bytes, the typing, display, and printing of DBCS characters requires hardware and programs that support DBCS. Contr
s, and also to discover information about the network to which they are attached. For more information about DHCP for IPv4, see RFC 213

Sun platorms from Oracle support DR. Some platorms might only support DR of certain types of hardware such as NICs.

ocation from any of the esoteric device groups assigned to the selected EDT. An EDT is identified by a unique ID (two digits), and contains one or more esot

 example, a packet would contain control information from the physical layer, followed by control information from the network layer, followed by the applica
d to the correct process.
, see RFC 2992 (http://tools.iet.org/html/rfc2992).

es a device from that group instead of a specific device number or generic device group. Synonymous with esoteric device group.

 It consists of a main program and, optionally, one or more subprograms. See executable, load module.

orts intermediate network routing, allowing it to support LU-LU sessions that do not terminate in its native network. Contrast with  peripheral border node .


PN application, must perform its own network configuration external to that specified in the NCP and Location profiles.

ns to a second controller when the first controller fails.
s execute in the foreground. Contrast with background.

rent table or be null.

tion. (2) In networking, the block of information transmitted between two or more stations in the data link layer of a network. It includes delimiters, control ch

performs a translation role as well as a connection role.
e problems that occur during system operation. Unlike system trace, however, GTF can be tailored to record very specific system and user program events.

tatement. z/OS interprets this name as "take any device in that group." In a given z/OS configuration, each eligible device table (EDT) has the same list of g
drivers and handles DLPI compatibility.

h all critical data mirrored between the sites. GDPS manages the remote copy configuration and storage subsystems; automates Parallel Sysplex operation

s of SMP/E processing.

key. The cryptographic strength of HMAC depends on the properties of the underlying hash function.
CHPIDs. Devices are represented as lines of text within the appropriate unit object in the configuration diagram.

otected resources. Also known as Resource Access Control Facility or RACF.
as it is used by the channel subsystem. The channel subsystem (CSS) uses the configuration data to control I/O requests. The IOCDS is built from the prod
rt is the host number.
, scheduling, and output processing. Contrast with JES3.
s so that the global processor exercises centralized control over the local processors and distributes jobs to them through a common job queue. Contrast w
 one or more DD statements, which specify the data sets or I/O devices that might be needed by the program.

uted free space. Relative byte addresses can change because of control interval or control area splits.

e Environment-conforming compilers.

This set of attributes are also known as a five-tuple.

ervers that use LDAP naming services to communicate with each other. For more information, see RFC 4511 (https://tools.iet.org/rfc/rfc45
for transmission.

ch list consists of a queue of list entries.

an entry for each TG connecting the network node to an end node. Each entry describes the current characteristics of the TG that it represents. A network n
ected Locate search.
tention management and recovery protocols.

ition has access to one channel subsystem image.

artitioned (LPAR) mode.

 on a storage controller. In general, the controller associates a given set of devices with only one logical subsystem.
ing many sessions with other LUs.

among logical partitions.
AC addresses are 6 bytes long and are controlled by the IEEE.
when a device has access to the transmission medium.

wide area network (WAN).

the new level.

sion. Whenever a new release of a program is shipped, the modification level is set to 0. When the release is reshipped with the accumulated services chan

nts, improve channel utilization, and improve I/O connectivity.
hey connect are not in use.

5661 respectively.
shared queues.

ork nodes are attached.

be processed by the link-edit utility. Also called object code or simplyOBJ .
ations are possible.

work services.

define the use of X.509 certificates by applications.


 packet mode operation. See circuit switching.

op bus topology.

t systems. For example, PAP can use the login and password entries in the UNIX passwd database on the system that receives a call to verify

ate each interconnection.

ns from CHPIDs to control units can.
nticated key exchange in IKE.

 subarea boundary node.

h determines the physical location of a channel in the processor. The PCHID is a three hexadecimal digit number and is assigned by the processor.
ered, managed, and manipulated like any other PCIe device. PFs have full configuration resources, and can be used to configure or control

cal unit (SSCP-LU) session.
ngle-image (SI) configuration .

hat the peers use for communication. The hardware and sofware connection between the two peers is considered the PPP link.
erating system components ranging from C language and shell interfaces to system administration.

he IEEE standard 1588-2008.

C frame instead of halting all the traffic on the datalink.

 incidents are reduced over time.

 section that can only be performed from within the program. In PL/I, a procedure is a named block of code that can be invoked externally, usually through a
nto a number of logical partitions.
e manipulated to enable or disable the occurrence of a program interruption.

dapter-Express (OSA-Express), HiperSockets, and Fiber Channel Protocol (FCP) channels.
ata sets that correspond to the files on the tape, and loads them from the tape.

ms (for example, awk, join, and sort) are designed to process data consisting of records separated by newlines, where each record contains a number of fie

arious DASD copying techniques, such as remote copy.
he detected accesses to protected resources. See IBM Security Server.

unit contains sense data defining the exception condition.

mands to the underlying operating system from these macros and procedures.

tools.iet.org/rfc/rfc903.txt).

estination addresses.
atabase server, and can be invoked from an SQL statement or by using the CALL statement. The three main classes of routines are procedures, functions, 
tion mechanism uses DES encryption. Applications that use Secure RPC include NFS and the NIS naming service.
 data set can contain data, text, a program, or part of a program. Contrast with partitioned data set (PDS).

hat receives remote procedure calls. Contrast with client.

d and transmitted. A single service access point can have many links terminating in it. (3) A logical address that allows a system to route data between a rem

unicate with each other. (3) A logical connection between two network accessible units (NAUs) that can be activated, tailored to provide various protocols, a
 master CSI.

rary routines, manuals, circuit diagrams. Contrast with hardware.

ort across a non-SNA wide area network, unpacked by another IBM 6611, and passed to the final destination. A benefit of spoofing is the prevention of end-t
OSPF routers on the network.

e optimizing storage resources. See storage management subsystem .


ements to the system through data class, storage class, management class, storage group, and ACS routine definitions. See  storage management .
one IP address. For more information, see RFC 4960 (http://tools.iet.org/html/rfc4960).

hin the subarea share a common subarea address and have distinct element addresses.
 superuser has the special rights and privileges needed to manage processes and files.

ation of both volumes when the volume pair is reset to the active duplex state.

manager, syncpoint coordinator, or a commit coordinator.
s a dialog interface, and supports dynamic allocation of data sets. SMP/E is the primary means of controlling changes to the z/OS operating system.

, can divide the network into domains of control, with each SSCP controlling the physical and logical units in its domain.

ins and destinations of information, that is, the users, to be independent of and unaffected by the specific SNA network services and facilities used for inform

edium, such as a wire or microwave beam, that is used to transmit data. Synonymous with transmission line.
e request to set up a dial-up link. Afer it is configured, a dial-in server can receive calls from any number of dial-out machines.

ing for inbound traffic and outbound load spreading for outbound traffic.

ges still in use today.
(node) to another. (3) See local area network.

 and so forth.

ns networks and in interconnected systems of such networks. It uses the Internet Protocol (IP) as the underlying protocol.

single logical link, and the transmission group is called a multilink transmission group (MLTG). A mixed-media multilink transmission group (MMMLTG) is on

and duplicate free. UDP provides no guarantees (the connectionless RPC protocol provides some guarantees on top of UDP).
6-bit international character set defined by ISO 10646. (2) An international character encoding scheme that is a subset of the ISO 10646 standard. Each ch

saction changing it completes.

e AIX operating system is IBM's implementation of the UNIX operating system. See  z/OS UNIX System Services .

uses the Internet Protocol (IP) to deliver datagrams.
n object and lasts only for the duration of the query. See Using Common Table Expressions Jump .

odes imposes a transmission priority on the underlying explicit route, provides flow control through virtual route pacing, and provides data integrity through s

amount of auxiliary storage available, not by the actual number of main storage locations. (2) An addressing scheme that allows external disk storage to app
ical sequence in which they are written on the data set or file (entry-sequence), or by relative-record number.
medium that is mounted and demounted as a unit, for example, a reel of magnetic tape or a disk pack.

age appears immediately before the line.
z/OS-skilled users can interact with the system, using familiar TSO/E commands and interactive menus to create and manage hierarchical file system files a

he lifetime of the secret key that is protecting the packet.


etwork for the system to adapt to the new environment.

h as Distance Vector Multicast Routing Protocol (DVMRP). For more information about DVMRP, see RFC 1075 (http://tools.iet.org/rfc/rfc10
-line links are more expensive than dial-up PPP links and therefore are less common.
ls up the remote peer by using the peer's telephone number. The dial-up link is the most common and least expensive PPP configuration.

m the peer. Subsequent lines repeat the expect-send instructions between local host and peer until all instructions that are required to esta

rmation, see RFC 1930 (http://tools.iet.org/html/rfc1930).

from one router to another through the network until the packet reaches its destination.

ual networks on the system, as well as from the external network.

er. The virtual router forwards the packets that are sent to the IP address of the master router. See also VRRP and VRID.

ple of an asymmetric key protocol.

PQoS. The major modules are classifier, meter, marker, scheduler, and dropper. IPQoS implements the classifier, meter, and marker module
used continuously provided that one interface in the group is functioning.

918). For more information about IPv6 private addresses, see RFC 4193 (http://www.iet.org/rfc/rfc4193.txt).

ta addresses, is represented by an IPMP interface.

ast which reaches all nodes.


measure of distance.

led Chem eStandards.

well as many other products.


r LDAP include RFCs 1777-1779 and 2251-2255.

sactions to be conducted securely over the Internet.


cifications for S/MIME version 2 include RFCs 2311–2315.
d host and then modify the packet headers so that the packets appear to be coming from that host.
directly connected to the I/O device.

y that doesn't match a request.

al network. For more information, see RFC 1350 (http://www.iet.org/rfc/rfc1350.txt).


ward packets to individual destinations. TRILL helps to load-balance the traffic between several paths to the destination.
extensions in order to work across multiple switches.

allowed to have configuration resources for its own behavior.

stantiated when VNICs are created and they are managed by EVS.

to an elastic virtual switch.


ructure to isolate multiple virtual networks.

to accept the system. [Afer IEEE 610]

analysis, compilation, or use of sofware products or applicable documentation. [IEEE 1044] See also defect, deviation, error, fault, failure, i

s. Beta testing is ofen employed as a form of external acceptance testing in order to acquired feedback from the market.

lso integration testing.


MMI is the designated successor of the CMM. [CMMI]

mplementation status, and verify compliance with specified requirements. [IEEE 610]

ing graph and a subroutine). [Afer McCabe]

ture/playback tools. [Fewster and Graham] See also keyword driven testing.
e program variables.

remove the failed entry criteria. [Gilb and Graham]


e task which have not been finished. Exit criteria are used by testing to report against and to plan when to stop testing. [Afer Gilb and Gra

s, and project control.

ment. In some (but not all) versions of this life cycle model, each subproject follows a ‘mini V-model’ with its own design, coding and testin

nted procedure. [Afer IEEE 610, IEEE 1028]


st. See also data driven testing.

which control flow is transferred at the end of the linear sequence.

ystem allocation, or evaluates the effectiveness of management approaches to achieve fitness for purpose. [Afer IEEE 610, IEEE 1028]
cts in the sofware. [ISO 9126] See also reliability.
ements are taken from selected transactions and these are logged. Performance testing tools normally provide reports based on test logs a

nce and quality improvement. [ISO 9000]

agement tools also provide facilities for static analysis, such as consistency checking and violations to pre-defined requirements rules.
its function under stated conditions. [Afer ISO 9126] See also efficiency.

est practices. See also intake test.

ed. [Afer IEEE 610]


es to the configuration, and the implementation status of the approved changes. [IEEE 610]

o be applied, exit criteria and test types to be performed.

zen test basis. [Afer TMap]


t, the test design techniques and test measurement techniques to be used, and the rationale for their choice, and any risks requiring contin

ore test levels or test phases. [Afer TMap]

y are fit for purpose and to detect defects.


esting. [Afer Fewster and Graham]

cess is repeated until the lowest level components have been tested.
xt stage of a project or process. See also service acceptance criteria.
cess or modify the assets. Access management is sometimes referred to as rights management or identity management.

ability management. See also modelling; simulation modelling.


ortfolio.

tolio, or as part of the configuration management system.

el targets for capacity and performance.

configuration item.

n, applications, infrastructure, or financial capital.

nagement system (CMS). See also relationship, configuration management system.


lso assessment; certification.

age. This calculation is ofen based on agreed service time and downtime. It is best practice to calculate availability of an IT service using m
propriate for the agreed service level targets for availability.

s is used to demonstrate how well the strategy is being achieved. A balanced scorecard has four major areas, each of which has a small num
nt to measure the effect of a service improvement plan. A performance baseline can be used to measure changes in performance over the
mpared to industry data or best practice. See also benchmarking; baseline.
results to measure progress or improvement.
uration baseline.

a customer within a business. The IT service provider may be part of the same business as its customer (internal service provider), or part
nt capacity management.

es reducing risks to an acceptable level and planning for the recovery of business processes should a disruption to the business occur. Busin
business continuity plans.

iness impact analysis defines the recovery requirements for IT services. These requirements include recovery time objectives, recovery poin

omers. Many business processes rely on IT services.


opriate catalogue of services. This Process has strong links with Service Level Management.

vices. A business service may consist almost entirely of an IT service – for example, an online banking service, or an external website where

elements of effective processes. It can be used to guide process improvement across a project, a division or an entire organization. CMMI h

iver the IT service, and plans for short-, medium- and long-term business requirements.

s. The plan also contains scenarios for different predictions of business demand, and costed options to deliver the agreed service level targ

are used to group similar types of configuration item.

configuration items.
he business, and representatives from third parties such as suppliers.

on (e.g. password reset), or may be very complex with many steps that require authorization (e.g. major sofware release). See also Change
ormally created by the service portolio management process and are passed to change management for authorization. Change manageme
cords should reference the configuration items that are affected by the change. Change records may be stored in the configuration manage

ntains information about changes that have already been implemented.


d to the service design lifecycle stage where a new or modified service design package will be created. The term charter is also used to desc
en triggered by others.

le, a PC, a handheld computer or a work station. l The part of a client server application that the user directly interfaces with – for exampl

information.

figuration items.
an. See also business capacity management; service capacity management.

he failure of multiple IT services) and fragile IT services (that have multiple single points of failure).
oming or outgoing telephone calls. See alsoautomatic call distribution; interactive voice response.

the configuration items themselves, so that the corresponding configuration records can be found.
ntained throughout its lifecycle by configuration management. Configuration items are under the control of change management. They typ
management is part of an overall service asset and configuration management process.
, and relationships with other configuration items.
cting, storing, managing, updating, analyzing and presenting data about all configuration items and their relationships. The configuration m
of a configuration management system.

performance of the IT service provider is continually measured and improvements are made to processes, IT services and IT infrastructure i

o means to manage the utilization or behaviour of a configuration item, system or IT service.

t and relevant to their specific role. Examples of control perspective include reactive and proactive management within IT operations, or a

alue on investment.

rtime etc. Cost elements can be further broken down to give cost units. For example, the cost element ‘expenses’ could include cost units o
ded within cost elements. For example, a cost element of ‘expenses’ could include cost units of hotels, transport, meals etc.
nt; value for money.

oke business continuity plans.


when making changes’ could be measured by key performance indicators such as ‘percentage reduction of unsuccessful changes’, ‘percent

he customer agreement portolio. See also customer-facing service; service catalogueue; service portolio.
ble for deployment, are recorded in the service catalogue along with customer-visible information about deliverables, prices, contact point
ustomer agreement portolio; service catalogue; service portolio.
level management, event management and incident diagnosis.

tion. It is a single logical storage area even if there are multiple locations. The definitive media library is controlled by service asset and con

l, it can involve use of differential charging to encourage customers to use IT services at less busy times. See also capacity man

hitectures, technology, processes, information and metrics.

e or function that carries out development work.

resolve their own incidents.


idth allocation.

s and may implement improvements to ensure that service targets can be met. The service provider may also provide additional resources

See also key performance indicator.


. See also Emergency Change Advisory Board.

ower system etc. Environment is used as a generic term to mean the external conditions that influence or affect something.
incident management, problem management and the management of customer complaints. There are two types of escalation: functional
ice providers.
for client organizations.

ally require IT operations personnel to take actions, and ofen lead to incidents being logged.

c indicating a potential capacity problem.


ontrolled or reduced.

s management, and environmental monitoring.

management and in IT service continuity planning.


e quicker if there is no need to restore data from backups.

y the IT organization. This process is not described in detail within the core ITIL publications. Fixed asset management is sometimes called fi

art of the IT service continuity plan. Gradual recovery typically takes more than three days, and may take significantly longer.

ult tolerance, resilience and fast recovery to reduce the number and impact of incidents.
nt that has a wider scope than the IT service provider, and includes handling of paper, building access, phone calls etc. for the entire organi

Information technology is ofen used to support business processes through IT services.

and human intervention.

d data will need to be restored, as part of the IT service continuity plan. Typical recovery times for intermediate recovery are one to three d

ternal metric.
present value; return on investment.
provider.

umentation.
.uk for more information.

comes should be defined in a service level agreement. Other IT services, called supporting services, are not directly used by the business b
ble level and planning for the recovery of IT services. IT service continuity management should be designed to support business continuity

vice management.
(itSMF chapters). The itSMF and its membership contribute to the development of ITIL and associated IT service management standards. S

specific times of the day, week, month or year.

e measured, but only the most important of these are defined as key performance indicators and used to actively manage and report on th
d improves efficiency by reducing the need to rediscover knowledge. See also Data-to-Information-to-Knowledge-to-Wisdom; service know

ay be stored elsewhere in the service knowledge management system.


onal fields in a problem record.

fware or IT service development to mean ability to be changed or repaired easily.

formance indicators, such as ‘percentage of changes leading to incidents’ or ‘first-time fix rate’.

vent management system or risk management system. See also system.


recovery option.

amework for continual improvement.

ng, until it next fails.

ly used to mean mean time to restore service.


n time to repair.

turn on investment.

e of the costs they incur, or as a stage during the introduction of real charging.

t for complex public sector projects.


ore; on-shore.

to perform as expected.
data from a disk drive.
ovided and the responsibilities of both parties. For example, there could be an operational level agreement:

er may include not carrying out a service improvement activity that the money could have been spent on. Opportunity cost analysis is used

he business (if known).

See also value network.

; Do – implement the plan and manage the processes; Check – measure the processes and IT

evel agreement may state that Priority 2 incidents must be resolved within 12 hours.

ecords, and uses data collected by other IT service management processes to identify trends or significant problems.

deliver the outputs. A process may define policies, standards, guidelines, activities and work instructions if they are needed.

or one process – for example, regional change managers or IT service continuity managers for each data centre. The process manager role i
n who carries out the process manager role, but the two roles may be separate in larger organizations.
methodology such as PRINCE2 or PMBOK.

monitor effectiveness and efficiency, and to improve them if necessary. See alsoquality management system.
ocess is not described in detail within the core ITIL publications. See also service validation and testing.

can be made available to the users (restoration).


use of dedicated facilities or third party facilities shared by multiple businesses.
upported by daily backups, and up to 24 hours of data may be lost. Recovery point objectives for each IT service should be negotiated, agre
greed and documented. See also business impact analysis.

es a dependency or connection between them. For example, applications may be linked to the servers they run on, and IT services have m

knowledge management system.


icences, documentation etc. A different release unit may be the complete payroll application, including IT operations procedures and user

is that a process, function etc. will deliver its required outputs. See alsoavailability.
e; value on investment.
ability to invoke IT service continuity plans again.
rtunities for improvement. See also change evaluation; post-implementation review.

uncertainty of outcome, and can be used in the context of measuring the probability of positive outcomes as well as negative outcomes.

s process is not described in detail within the core ITIL publications. See also risk assessment.
ut by a single person. Role is also used to describe the purpose of something or what it is used for.

e all IT services delivered out of a named data centre.

ent system.

ails of how the assets have been configured and the relationships between assets.
d, recorded and analysed for use in the capacity plan. See also business capacity management; component capacity management.
hat are visible to the business; and supporting services required by the service provider to deliver customer-facing services. See also custom

strained, project-like activity, rather than an ongoing process of analysis.

The service knowledge management system includes tools for collecting, storing, managing, updating, analyzing and presenting all the kno

r and the customer. A single agreement may cover multiple IT services or multiple customers. See also operational level agr
d underpinning contracts are appropriate for the agreed service level targets. Service level management monitors and reports on service le

es. They should be SMART, and are usually based on key performance indicators.

siders the strategy, design, transition, operation and continuous improvement of IT services. Also known as service lifecycle.

ces and interactions). A service model can be used as a template or blueprint for multiple services.

ee also business relationship management.

ervice portolio that is not normally published to customers.


ue (live or available for deployment) and retired services. See also customer agreement portolio; service portolio management.

e provider; Type III service provider.

ss, usually in conjunction with the service desk. Service requests may be linked to a request for change as part of fulfilling the request.

and improvements are made to processes, IT services and IT infrastructure in order to increase efficiency, effectiveness and cost-effectiven

odelled with artificial workloads or transactions. They are used in capacity management when accurate results are important. A simulation

ructure. See also failure.


met, missed or nearly missed during each of the previous 12 months.

ent. See also baseline; benchmark.

rd against which an organization can be audited.

e of practice or specification published by a standards organization such as ISO or BSI. See also guideline.
mplement a standard change, and they are logged and tracked using a different mechanism, such as a service request. See also change mo

andby arrangements.
also responsible for ensuring that it achieves its intended business outcomes.

g organizations. See also supply chain; underpinning contract.

ce hours. For example, service hours may be 24 hours a day, but the support hours may be 07:00 to 19:00.
used by the IT service provider. All live supporting services, including those available for deployment are recorded in the service catalogue

ce level agreements. See also underpinning contract.

security management and IT service continuity management, but also applies to other areas such as problem and availability managemen

d improvement.
or none of them is carried out.

nd deployment management, service validation and testing, change evaluation, and knowledge management.
e behaviour. It is also used as a management tool for identifying deficiencies in IT service management processes.
on-technical resources. Tuning is part of capacity management, which also includes performance monitoring and implementation of the req

meet agreed service level targets in a service level agreement.

e end of the financial year. Impact and urgency are used to assign priority.
e’. The business value of an IT service is created by the combination of utility and warranty. See also service validation and testing.
esign. See also acceptance; qualification; service validation and testing; verification.

n and testing.
processes – for example, verifying the serial number of a desktop PC when a user logs an incident. Audit is a periodic, formal check.
updated functionality from version 2.

e to be available when needed, to provide the required capacity, and to provide the required reliability in terms of continuity and security.

orkarounds for incidents that do not have associated problem records are documented in the incident record.
onfiguration items and IT services. The term is sometimes used as a synonym for throughput.
rchitecture Jump .
. See virtual address space, data space.

automated resource registration and directory lookup. APPN extends the LU 6.2 peer orientation for end-user services to network control and supports mult
 to other end nodes. See Advanced Peer-to-Peer Networking .
may be unavailable even though the components used to provide the service are all available, and vice-versa.
Es) are connected.

tainable cell rate (SCR), and maximum burst size (MBS).
shared channel between all devices plugged into it.
Intermediate Language, or MSIL. See Common Intermediate Language Jump .
 Communications Server includes the necessary interfaces for network management and is available on several operating systems (such as AIX®, z/OS, a
ous with controller or device control unit.

 contains the record's key.
is in a similar wait state.

al pair of LU 6.2 sessions (referred to as a CP-SVR pipe).
trol program to locate blocks of data that are stored in separate areas of a data set in direct access storage.

nywhere in the network by means of the same name.
programs that support DBCS. Contrast with single-byte character set.
bout DHCP for IPv4, see RFC 2131 (http://www.iet.org/rfc/rfc2131.txt) and DHCP for IPv6, see RFC 3315 (http://www.iet.org/rfc/rfc3315.tx

such as NICs.

gits), and contains one or more esoterics and generics.

etwork layer, followed by the application protocol data. See data link switching (DLSw).
trast with peripheral border node .
ork. It includes delimiters, control characters, information, and checking characters.
ic system and user program events.

ce table (EDT) has the same list of generics.

automates Parallel Sysplex operational tasks; and automates failure recovery from a single point of control.
ts. The IOCDS is built from the production IODF.
gh a common job queue. Contrast with JES2.
1 (https://tools.iet.org/rfc/rfc4511.txt).
he TG that it represents. A network node has both a local and a network topology database, while an end node has only a local topology database.
d with the accumulated services changes incorporated, the modification level is incremented by 1.
stem that receives a call to verify the identity of the caller.
s assigned by the processor.
be used to configure or control the PCIe device.

nsidered the PPP link.


invoked externally, usually through a a call.
each record contains a number of fields separated by spaces or some other character. awk can also handle records separated by characters other than ne
 routines are procedures, functions, and methods. (3) In REXX, a series of instructions called with the CALL instruction or as a function. A routine can be eit
 system to route data between a remote device and the appropriate communications support. (4) The identification of the services provided by a specific co

lored to provide various protocols, and deactivated, as requested. Each session is uniquely identified in a transmission header (TH) accompanying any tran
of spoofing is the prevention of end-to-end session time-outs.
. See storage management .
o the z/OS operating system.

services and facilities used for information exchange.
dial-out machines.
transmission group (MMMLTG) is one that contains links of different medium types (for example, token-ring, switched SDLC, nonswitched SDLC, and fram
of the ISO 10646 standard. Each character supported is defined using a unique 2-byte code. See Extended Binary Coded Decimal Interchange Code, Ame
and provides data integrity through sequence numbering of path information units (PIUs).

at allows external disk storage to appear as main storage.
manage hierarchical file system files and to copy data back and forth between z/OS data sets and files. Application programmers and users have both sets o

5 (http://tools.iet.org/rfc/rfc1075.txt).
st expensive PPP configuration.

ructions that are required to establish communications are successfully negotiated.

RP and VRID.

sifier, meter, and marker modules. For more information, see RFC 2475 (http://www.iet.org/rfc/rfc2475.txt).
t, deviation, error, fault, failure, incident, problem.

m the market.
stop testing. [Afer Gilb and Graham]

ts own design, coding and testing phases.


[Afer IEEE 610, IEEE 1028]
vide reports based on test logs and graphs of load against response times.

defined requirements rules.


ce, and any risks requiring contingency planning. It is a record of the test planning process [Afer IEEE 829]
management.

ailability of an IT service using measurements of the business output.

as, each of which has a small number of KPIs. The same four areas are considered at different levels of detail throughout the organization.
hanges in performance over the lifetime of an IT service. A configuration baseline can be used as part of a back-out plan to enable the IT in
nternal service provider), or part of another business (external service provider).

ption to the business occur. Business continuity management sets the objectives, scope and requirements for IT service continuity managem

ry time objectives, recovery point objectives and minimum service level targets for each IT service.

ce, or an external website where product orders can be placed by business customers. See also customer-facing service.

r an entire organization. CMMI helps integrate traditionally separate organizational functions, set process improvement goals and priorities

ver the agreed service level targets.

ofware release). See also Change Advisory Board; standard change.


uthorization. Change management will review the potential impact on other services, on shared resources, and on the overall change sche
red in the configuration management system, or elsewhere in the service knowledge management system.
term charter is also used to describe the act of authorizing the work required by each stage of the service lifecycle with respect to the new

ctly interfaces with – for example, an e-mail client.

voice response.

f change management. They typically include IT services, hardware, sofware, buildings, people and formal documentation such as process

lationships. The configuration management system may also include information about incidents, problems, known errors, changes and re

T services and IT infrastructure in order to increase efficiency, effectiveness and cost-effectiveness. See also Plan–Do–Check–

ement within IT operations, or a lifecycle view for an application project team.

enses’ could include cost units of hotels, transport, meals etc.


sport, meals etc. See also cost type.

f unsuccessful changes’, ‘percentage reduction in changes causing incidents’ etc.

eliverables, prices, contact points, ordering and request processes. Other information such as relationships to supporting services and othe

ntrolled by service asset and configuration management and is recorded in the configuration management system.

ee also capacity management.

lso provide additional resources for incident and problem management during this time.

ffect something.
o types of escalation: functional escalation and hierarchic escalation.

anagement is sometimes called financial asset management.

gnificantly longer.
ne calls etc. for the entire organization.

iate recovery are one to three days.

t directly used by the business but are required by the service provider to deliver customer-facing services. See also core service; enabling s
d to support business continuity management.

ervice management standards. See www.itsmf.com for more information.

ctively manage and report on the process, IT service or activity. They should be selected to ensure that efficiency, effectiveness and cost-eff
wledge-to-Wisdom; service knowledge management system.
Opportunity cost analysis is used as part of a decision-making process, but is not treated as an actual cost in any financial statement.

e the processes and IT services, compare with objectives and produce reports; 

f they are needed.

ntre. The process manager role is ofen assigned to the person who carries out the process owner role, but the two roles may be separate i
ement system.

ervice should be negotiated, agreed and documented, and used as requirements for service design and IT service continuity plans.

y run on, and IT services have many links to all the configuration items that contribute to that IT service.

operations procedures and user training.


as well as negative outcomes.

capacity management.
r-facing services. See also customer agreement portolio.

lyzing and presenting all the knowledge, information and data that an IT service provider needs to manage the full lifecycle of IT services. S

o operational level agreement.


onitors and reports on service levels, and holds regular customer reviews.

service lifecycle.

ortolio management.

part of fulfilling the request.

effectiveness and cost-effectiveness. Opportunities for improvement are recorded and managed in the CSI register.

sults are important. A simulation model is sometimes called a performance benchmark. See also analytical modelling; modelling.

vice request. See also change model.


ecorded in the service catalogue along with information about their relationships to customer-facing services and other CIs.

em and availability management.

g and implementation of the required changes.


e validation and testing.
verification.

a periodic, formal check.

erms of continuity and security. Warranty can be summarized as ‘how the service is delivered’, and can be used to determine whether a se
o network control and supports multiple LU types, including LU 2, LU 3, and LU 6.2.
ng systems (such as AIX®, z/OS, and Windows® NT). z/OS Communications Server is not available as a stand-alone product. Rather, it is an element of th
ttp://www.iet.org/rfc/rfc3315.txt).
 a local topology database.
parated by characters other than newlines. See fixed-length record, variable-length record.
or as a function. A routine can be either internal or external to a user's program. (4) A set of statements in a program that causes the system to perform an o
e services provided by a specific communication service provider to one of its users. For example, the Internet Protocol (IP) uses the services of a token-rin

header (TH) accompanying any transmissions exchanged during the session. (2) A logical or virtual connection between two stations, programs, or devices
DLC, nonswitched SDLC, and frame-relay links).
ed Decimal Interchange Code, American Standard Code for Information Interchange.
ammers and users have both sets of interfaces to choose from and, by making appropriate trade-offs, can choose to mix these interfaces.
il throughout the organization.
back-out plan to enable the IT infrastructure to be restored to a known configuration if a change or release fails.
for IT service continuity management.

acing service.

mprovement goals and priorities, provide guidance for quality processes, and provide a point of reference for appraising current processes

, and on the overall change schedule. Once approved, service portolio management will charter the service.
lifecycle with respect to the new or changed service. See also change proposal; service portolio; service catalogue..

l documentation such as process documentation and service level agreements.

s, known errors, changes and releases. The configuration management system is maintained by service asset and configuration manageme

also Plan–Do–Check–Act.
to supporting services and other CIs will also be recorded for internal use by the IT service provider.
See also core service; enabling service; enhancing service.

ciency, effectiveness and cost-effectiveness are all managed.


n any financial statement.

eports; Act – plan and implement changes to improve the processes.

the two roles may be separate in larger organizations.


ervice continuity plans.
e the full lifecycle of IT services. See also knowledge management.
modelling; modelling.
es and other CIs.
used to determine whether a service is ‘fit for use’. The business value of an IT service is created by the combination of utility and warranty
product. Rather, it is an element of the z/OS operating system. z/OS Communications Server includes the function of these former IBM products: TCP/IP fo
at causes the system to perform an operation or a series of related operations.
 (IP) uses the services of a token-ring adapter. The service access point, in this case, is the name by which IP knows the adapter that is the token-ring add

n two stations, programs, or devices on a network that allows the two elements to communicate and exchange data, or the activities that occur during the e
ix these interfaces.
for appraising current processes. See www.sei.cmu.edu/cmmi for more information. See also maturity.
set and configuration management and is used by all IT service management processes. See also configuration management database.
mbination of utility and warranty. See also service validation and testing.
ese former IBM products: TCP/IP for MVS/ESA™ and VTAM® for MVS/ESA. The VTAM for MVS/ESA function is called Communications Server - SNA Serv
e adapter that is the token-ring address.

the activities that occur during the establishment, maintenance, and release of the connection. A session can be activated and deactivated as requested. S
tion management database.
d Communications Server - SNA Services, and the TCP/IP for MVS/ESA function is called Communications Server - IP Services.
ed and deactivated as requested. See transaction.

Das könnte Ihnen auch gefallen