Browse Definitions :
Definition

OS/400

OS/400 is IBM's operating system for its AS/400 and AS/400e line of business computers. Because OS/400 is closely attuned to the AS/400 hardware design and generally comes as part of the basic package, there is no alternative operating system to compete with it. OS/400 is built to operate with the AS/400 logical partition (LPAR) architecture, in which multiple instances of the operating system can run concurrently in different partitions. Among other uses, LPAR is useful when migrating to a new release. The old production system can keep operating in one partition while a new system is being tested.

As the AS/400 has evolved to meet the latest trends in business and information technology, OS/400 and its related software has added support for:

  • Applications written in the Java programming language
  • The ability to run Windows 2000/NT applications (when certain other products are installed)
  • The Portable Application Solutions Environment (PASE), which supports a subset of the AIX environment so that UNIX applications can be ported and run on the AS/400
  • Lotus Domino, which provides groupware and e-mail from Lotus Notes applications or a standard Web browser
This was last updated in October 2008

Continue Reading About OS/400

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • block cipher

    A block cipher is a method of encrypting data in blocks to produce ciphertext using a cryptographic key and algorithm.

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close