Browse Definitions :
Definition

MPE/iX

MPE/iX is the operating system for the line of e3000 midrange business server s from Hewlett-Packard (HP). Its latest version, MPE/iX Version 7.0, is marketed as " Web -enabled" and "Internet-ready." The operating system includes support for Java and HP describes it as providing " OLTP performance and functionality for business-critical applications." Support also is provided for PCI I/O devices. HP emphasizes the value of an operating system that, since its first release in 1972 has built a reputation for being stable, reliable, and robust .

MPE/iX provides support for applications that use standard POSIX C functions. In 2001, HP plans to run MPE-iX on e3000s that use the Intel Itanium ( IA-64 ) microprocessor architecture. MPE originally stood for "Multi-Programming Executive." The "iX" suggests its new support for POSIX (UNIX-compatible) applications and interfaces and a hierarchical file system. Unlike HP's other major operating system, HP-UX (for the HP 9000 server line), MPE/iX supports all the legacy application s that have been written for HP 3000 computers over the years.

This was last updated in June 2008
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close