ACL
|
Access Control List
|
ACS
|
Automatic Class Selection
|
CCA
|
IBM Common Cryptographic Architecture
|
CDA
|
Cloud Data Access
|
CDS
|
Control Data Set
|
CKDS
|
Cryptographic Key Data Set
|
CPACF
|
CP Assist for Cryptographic Functions
|
CPC
|
central processor complex
|
CPU
|
central processing unit
|
CSR
|
Certificate Signing Request
|
CVQ
|
common recover queue
|
DFSMS
|
Data Facility Storage Management Subsystem
|
DR
|
disaster recovery
|
DSCLI
|
DS8000 Command-line Interface
|
DSS
|
Data Storage Services
|
FC
|
Feature Code
|
FVD
|
full volume dump
|
GDG
|
Generation Data Group
|
GID
|
group ID
|
GKLM
|
Guardium Key Lifecycle Manager
|
HA
|
high availability
|
HMC
|
Hardware Management Console
|
HSM
|
Hierarchical Storage Manager
|
IBM
|
International Business Machines Corporation
|
ICSF
|
IBM Integrated Cryptographic Service Facility
|
IPL
|
initial program load
|
ISMF
|
Interactive Storage Management Facility
|
KMIP
|
Key Management Interoperability Protocol
|
KSDS
|
key-sequenced data set
|
LIC
|
Licensed Internal Code
|
LSS
|
logical subsystem
|
MCD
|
Migration Control Data Set
|
MCVT
|
management communication vector table
|
MD
|
migration exit
|
MES
|
miscellaneous equipment specification
|
ML1
|
Migration Level 1
|
ML2
|
Migration Level 2
|
PDS
|
partitioned data set
|
PEM
|
Privacy Enhanced Mail
|
PiT
|
point in time
|
PPRC
|
Peer to Peer Remote Copy
|
RACF
|
IBM Resource Access Control Facility
|
REST
|
Representational State Transfer
|
SAF
|
System Authorization Facility
|
SCDS
|
Source Control Data Set
|
SDSP
|
small data set packing
|
SOW
|
statement of work
|
SSD
|
solid-state disk
|
SSL
|
Secure Sockets Layer
|
TCN
|
tape copy needed
|
TCT
|
Transparent Cloud Tiering
|
TLS
|
Transport Layer Security
|
URI
|
Uniform Resource Identifier
|
VE
|
Virtualization Engine
|
VSAM
|
Virtual Storage Access Method
|
VTOC
|
volume table of contents
|
WETK
|
Web Enablement Toolkit
|
WUI
|
Web User Interface
|