(n.) This protocol specifies a binding from the iCalendar Transport-Independent Interoperability Protocol to Internet email-based transports. This protocol is also known as iMIP. iMIP is defined in RFC 2447.
(n.) An Internet protocol based on the iCalendar object specification that provides scheduling interoperability between different calendar systems. This protocol is also known as iTIP. iTIP is defined in RFC 2446.
(integrated development environment) (n.) Software that allows you to create, assemble, deploy, and debug code from a single graphical user interface.
(n.) A protocol that provides a means to determine the identity of a remote process responsible for the remote end of a particular TCP connection. This protocol is also known as IDENT. Defined in RFC 1413.
(n.) A set of information by which one end user is definitively distinguished. By defining a user identifier and password, an email address, personal preferences (such as style of music, or opt-in/opt-out marketing decisions) and other information specific to a particular business (a bank account number or ship-to address), end users distinguish themselves from others who also use the service.
(n.) A process that occurs when a user chooses to unite distinct service provider accounts with identity provider accounts. Users retain their individual account information with each provider while simultaneously establishing a link that allows the exchange of authentication information between provider accounts. Also called account federation.
(n.) A service provider that specializes in providing authentication services. As the administrating service for authentication, the identity provider maintains and manages identity information. Authentication provided by an identity provider is honored by all service providers with whom the identity provider is affiliated.
(n.) An identity service is a Web service that acts upon a resource to retrieve, update, or perform some action on data attributes related to a Principal (an identity). An example of an identity service might be a corporate phone book or calendar service.
(interface definition language) (n.) A language used to define interfaces to remote CORBA objects. The interfaces are independent of operating systems and programming languages. Describes functional interfaces for remote procedure calls (RPC), so that a compiler can generate proxy and stub code that marshals parameters between machines.
(n.) A type of state in which the robot is still running but has processed all the URLs in its URL pool. In this state, the robot can still respond to status requests.
(i-mode hypertext markup language) (n.) The language used with NTT DoCoMo’s Japanese i-mode service.
(Internet Inter-ORB Protocol) (n.) A transport-level protocol used by both Remote Method Invocation (RMI) over IIOP and Common Object Request Broker Architecture (CORBA). Used for communication between CORBA object request brokers.
(n.) An IIOP cluster that has been configured for high availability of RMI/IIOP requests.
(n.) An IIOP listener that has been configured for an IIOP cluster to enable high availability of RMI/IIOP requests.
(n.) A listen socket that listens on a specified port and accepts incoming connections from CORBA-based client applications.
(1) (n.) A process that makes areas of an image active, letting users navigate and obtain information by clicking the different regions of the image with a mouse.
(Internet Message Access Protocol Version 4) (n.) A standard protocol that allows users to be disconnected from the main messaging system and still be able to process their mail. The IMAP specification allows for administrative control for these disconnected users and for the synchronization of the users’ message store once they reconnect to the messaging system.
(n.) In the DIT, an entry is the immediate superior of another entry if its distinguished name, followed by the relative distinguished name of the other entry, forms the distinguished name of the child entry.
(n.) An act whereby one object assumes the identity and privileges of another object without restrictions and without any indication visible to the recipients of the impersonator's calls that delegation has taken place. Impersonation is a case of simple delegation.
(n.) The process used during importing.
(n.) The process of bringing new or updated resource descriptions from another database into the Search Engine.
(n.) A set of command-line utilities for managing domain administrators, users, and groups.
(n.) A set of command-line utilities for performing various maintenance, testing, and management tasks for the MTA.
(n.) An environment which is not currently booted or designated for activation upon the next reboot. See also active boot environment.
(n.) The name reserved for a user’s default mailbox. Used for mail delivery. INBOX is the only folder name that is case-insensitive, which means that INBOX, Inbox, and inbox are all valid names for a user’s default mailbox.
(n.) A centralized, searchable database of resources or documents. Also known as a catalog.
(n.) The process of providing a centralized, searchable database of resources. Also known as cataloging.
(n.) Each index that the directory uses is composed of a table of index keys and matching entry ID lists.
(n.) Identifies the template entry using the value of one of the target entry\qs attributes.
(n.) (UNIX only) A file listing programs that need to be restarted if they stop for any reason. The file ensures that a program runs continuously. Because of its location, the file is also called /etc/inittab. This file is not available on all UNIX systems.
(n.) The directory into which the binary (executable) files of a server are installed. For the Messaging Server, the installation directory is a subdirectory of the server root: server-root/bin/msg/. See also instance directory.
(n.) The full path under which Directory Server Enterprise Edition software is installed. You can choose the installation path when installing software for the first time.
(n.) The directory that contains the files that define a specific instance of a server. For the Messaging Server, the instance directory is a subdirectory of the server root: server-root/msg-instance/, where instance is the name of the server as specified at installation. For the Application Server, the instance directory is a subdirectory of the domain directory. See also installation directory, server instance.
(n.) The full path under which data for a Directory Server or Directory Proxy Server server instance is located. You choose the instance path when creating a server instance.
(n.) The client that enables users to send and receive instant messages and alerts.
(n.) A manager of client connections. Improves Instant Messaging Server scalability by allowing a large number of concurrent client connections to require only a few connections to the back-end Instant Messaging server. Instant Messaging clients connect to the multiplexor rather than to the Instant Messaging server itself. When installed on the public side of a firewall, the multiplexor protects the user database from intruders, leaving the Instant Messaging Server behind the firewall.
(1) (n.) Refers to the Java Enterprise System Messaging Server product itself, including all components (server, multiplexor, and Java Enterprise System Instant Messaging Server).
(2) (n.) The back-end server process within the product that handles incoming commands from Instant Messaging (through the Instant Messaging Server multiplexor). The Instant Messaging Server also communicates with the LDAP server in the authentication of Instant Messaging users. See also Instant Messaging multiplexor
(n.) An object within a server that performs various requests (such as HTTP, NNTP, SMTP, and FTP requests) on behalf of the user. In a sense, the intelligent agent acts as a client to the server, making requests that the server fulfills.
(n.) A type of search index. Speeds up searches for information in a DIT in which the attributes have language tags.
(n.) A network of Transmission Control Protocol/Internet Protocol networks within a company or organization. Intranets enable companies to employ the same types of servers and client software used for the World Wide Web for internal applications distributed over the corporate LAN. Sensitive information on an intranet that communicates with the Internet is usually protected by a firewall. See also firewall, extranet.
(n.) An error condition that occurs during message handling. When this error condition occurs, the message store sends a communication to the MTA and then deletes its copy of the message. The MTA bounces the message back to the sender and deletes its copy of the message.
(Internet Protocol) (n.) Protocol within the Transmission Control Protocol/Internet Protocol suite used to link networks worldwide. Developed by the United States Department of Defense and used on the Internet. The prominent feature of this suite is the IP protocol.
(n.) A set of numbers separated by dots, such as 192.168.255.255, that specifies the actual location of a machine on an intranet or the Internet. A 32-bit address assigned to hosts using Transmission Control Protocol/Internet Protocol.
(n.) Integrated Services Digital Network.
(n.) An HTML tag that turns on searching in the client. Documents can use a network navigator’s capabilities to accept a search string and send it to the server to access a searchable index without using forms. In order to use the ISINDEX HTML tag, you must create a query handler.
(n.) An extension to the IMG SRC tag used in an HTML document to tell the server that the named image is an imagemap.
(n.) The international standard for country codes maintained by the International Organization for Standardization (ISO).
(n.) An International Organization for Standardization standard that specifies the numeric representation of date and time. The Calendar Server uses ISO 8601 standard notations to represent date, time, and duration strings.
(n.) Independent software vendor.