Netsuite Data Center

Total Page:16

File Type:pdf, Size:1020Kb

Netsuite Data Center Enterprise-Class Data Management, Security, Performance and Availability NetSuite Data Center Oracle NetSuite currently operates geographically distinct data centers across North America, Europe, and Asia-Pacific. Each data center has a Data Center Locations counterpart that provides data mirroring, disaster North America • Seattle recovery and failover capabilities in its region in case any data center becomes non-operational. • Santa Clara The NetSuite service is natively multi-tenant and • Phoenix leverages cloud infrastructure designed around • Chicago multiple layers of redundancy. • Boston • Ashburn Europe • London • Dublin • Frankfurt • Amsterdam Asia-Pacific • Sydney • Melbourne www.netsuite.com NetSuite Data Center Infrastructure • Scalability: NetSuite supports over 26,000 Data Management customers with over 1.5 billion application • Redundancy: Many layers in the NetSuite requests per day and more than six petabytes of system contain multiple levels of redundancy. data under management. The system has been This design allows uninterrupted service designed to accommodate routine surges and because redundant systems automatically spikes in usage, and to scale upward smoothly assume processing in the event that one or to address increased transaction volume. more elements fail. Application Security • Disaster Recovery (DR): Within each region, data • Encryption: Transmission of user credentials, is replicated and synchronized between data as well as all data in the resultant connection, centers. Semi-annual DR exercises ensure that are encrypted with industry standard protocol systems and processes are in place, as well as and cipher suite. NetSuite supports Custom to assess and enhance the competency of all Attribute encryption and provides encryption personnel key to the successful implementation APIs. NetSuite uses token-based application of DR activities. Data centers use archival media authentication and multi-factor backups, which supports customer-initiated data end-user authentication. restores for up to a year. © Oracle | Terms of Use and Privacy Page 2 • Role-Level Access and Idle Disconnect: Operational Security Each end user can be assigned a specific role • Continuous Monitoring: NetSuite employs both with permissions that are specific only to his or network and server-based Intrusion Detection her own job. There is a complete audit trail that Systems (IDS) to identify malicious traffic tracks changes to each transaction by the user attempting to access its servers and networks. login details and a timestamp. Security alerts and logs are sent to a Security • IP Address Restrictions: Customers can restrict Information and Event Management (SIEM) access to a NetSuite account from specific system for monitoring and response actions by computers and/or locations, which is valuable a dedicated security team. for those who are concerned not only about • Separation of Duties: In addition to mandatory who is able to access their NetSuite account but employee background checks at all levels of from where they access it as well. This feature the operations organization, job responsibilities significantly reduces the risk of unauthorized are separated. The Principle of Least Authority third parties accessing a user’s account. (POLA) is followed and employees are given • Robust Password Policies: Customers have only those privileges that are necessary to do granular password configuration options, their duties. ranging from the length of the passwords to • Physical Access: All data centers maintain the password expiration policy. They can set up stringent physical security policies and controls strict policies to ensure that new passwords vary including photo IDs, proximity access cards, from prior passwords and that passwords are biometrics, single person entry portals and complex enough to include a combination of alarmed perimeters. numbers, letters and special characters. • Dedicated Security Team: Oracle NetSuite Accounts are also locked out after several employs a global security team dedicated to unsuccessful attempts. For customers who desire enforcing security policies, monitoring alerts and a higher level of access control, there is a multi- investigating any anomalous system behavior factor authentication option using text SMS, including unauthorized connection attempts and one-time passwords (OTP) and backup codes. In malicious software. Near real-time monitoring addition to entering their own passwords, users is in place with a 24x7 worldwide incident must possess TOTP-compatible devices to response capability. All access to production is receive the random one-time passwords. These approved and regularly reviewed by the cryptographically robust passwords prevent security team. key loggers, shoulder surfers, phishers and password crackers from accessing a user’s account. © Oracle | Terms of Use and Privacy Page 3 • Data Center Performance Audits: There are a secure environment. A PCI Qualified Security auditing controls appropriate for SOC 1 Type II, Assessor (QSA) issues an Attestation of SOC 2 Type II, ISO 27001 and PCI compliance. Compliance (AOC) to NetSuite. NetSuite has implemented a comprehensive • Privacy Certifications: Oracle Corporate risk management process modeled after the (Oracle EMEA Ltd) has obtained EU/EEA-wide National Institute of Standards and Technology’s authorization from the European data protection (NIST) special publication 800-30 and the ISO authorities for its Binding Corporate Rules for 27000 series of standards. Periodic audits Processors (BCR-p). This helps our customers are carried out to help ensure that personnel address their privacy and security requirements performance, procedural compliance, under the EU General Data Protection equipment serviceability, updated authorization Regulation (GDPR) and other European data records and key inventory rounds meet or protection laws and regulations in the EU/ exceed industry standards. EEA, the UK and Switzerland (“European Data • Security Certifications: Oracle NetSuite issues Protection Law”). See the Privacy Code for reports upon the completion of periodic SOC 1 Processing Personal Information of Customer Type II and SOC 2 Type II audits and is certified Individuals (Oracle Processor Code). for PCI DSS and ISO 27001:2013. Oracle NetSuite provides Product Feature ¤ Oracle NetSuite has defined its Information Guidance documents that describe how the Security Management System in accordance service functionality is designed to assist with NIST 800-53 and ISO 27000 customers with their EU GDPR requirements. series standards. Oracle NetSuite has extended the ISO 27001 ¤ Independent third-party auditors prepare Information Security Management System to and conduct SOC 1 Type II and SOC 2 Type II include the ISO 27018 control set, demonstrating audits. A SOC 1 Type II audit report is essential protection and adequacy for processing to meeting the reporting requirements on the Personal Information as a Public Cloud Hosting effectiveness of internal controls over financial Provider. Oracle NetSuite performs reviews reporting of Section 404 of the Sarbanes- and annual audits, conducts privacy risk Oxley Act. SOC 2 Type II reports on controls management and oversees remediations, has that directly relate to the security, availability a third-party vendor management program to and confidentiality trust services criteria at a ensure that the suppliers adhere to the privacy service organization. regulations, oversees privacy by design in technology and processes, and is committed ¤ PCI DSS is a security standard designed to to maintaining and improving its privacy ensure that companies are processing, storing information management and data and transmitting payment card information in protection programs. © Oracle | Terms of Use and Privacy Page 4 Performance Availability • Scalable Application Architecture: The NetSuite • Service Level Commitment (SLC): An SLC application runs on a three-tiered architecture guarantees a 99.7% uptime (outside scheduled supported by additional specialized services. All service windows) for the NetSuite production tiers are highly scalable and support multi-data application for all customers. A credit is available center deployment. if NetSuite does not deliver its application • Performance Team: NetSuite invests heavily services with 99.7% uptime. A publicly available in performance at every layer. This includes status page is provided to display system status a dedicated performance team of developers at all times that includes quantitative current and database engineers whose sole purpose is and historic uptime metrics as well as up-to-the- to proactively verify application performance minute announcements during disruptions. benchmarks and tune the application for • World-Class Hosting Operations Team: A maximum performance. global team of dedicated operations personnel • High-Performance Databases: The NetSuite proactively monitors the health of the entire application runs on high-performance system with industry leading alert and trend- database server hardware with multiple cores based tools designed to identify and resolve and maximum RAM configuration. NetSuite events before they impact the live site. This production database servers run exclusively on team provides 24x7 coverage to respond to any solid state storage ensuring the fastest possible incident with automated recovery procedures. database I/O performance available in • Dedicated Event Response Team: A global cloud the industry.
Recommended publications
  • Data Centers and Cloud Computing Data Centers
    Data Centers and Cloud Computing Data Centers • Large server and storage farms – 1000s of servers • Intro. to Data centers – Many TBs or PBs of data • Virtualization Basics • Used by – Enterprises for server applications – Internet companies • Intro. to Cloud Computing • Some of the biggest DCs are owned by Google, Facebook, etc • Used for – Data processing – Web sites – Business apps Computer Science Lecture 22, page 2 Computer Science Lecture 22, page 3 Inside a Data Center MGHPCC Data Center • Giant warehouse filled with: • Racks of servers • Storage arrays • Cooling infrastructure • Power converters • Backup generators • Data center in Holyoke Computer Science Lecture 22, page 4 Computer Science Lecture 22, page 5 Modular Data Center Virtualization • ...or use shipping containers • Each container filled with thousands of servers • Can easily add new containers • Virtualization: extend or replace an existing interface to – “Plug and play” mimic the behavior of another system. – Just add electricity – Introduced in 1970s: run legacy software on newer mainframe hardware • Allows data center to be easily • Handle platform diversity by running apps in VMs expanded – Portability and flexibility • Pre-assembled, cheaper Computer Science Lecture 22, page 6 Computer Science Lecture 22, page 7 Types of Interfaces Types of OS-level Virtualization • Different types of interfaces – Assembly instructions – System calls • Type 1: hypervisor runs on “bare metal” – APIs • Type 2: hypervisor runs on a host OS • Depending on what is replaced /mimiced,
    [Show full text]
  • Deploy, Operate, and Evolve Your Data Center: HP Datacenter Care
    Brochure Deploy, operate, and evolve your data center HP Datacenter Care The data center is evolving—shouldn’t Improve agility, scalability—react at the your support keep pace? speed of business Historically, business-critical IT has been delivered on dedicated, HP Datacenter Care service is designed to support this homogenous, and proprietary infrastructures. In this siloed results-oriented approach by providing an environment-wide IT model, performance, uptime, and security outweighed support solution tailored to your needs. HP Datacenter Care considerations of speed, agility, and cost. Now, however, the trends is a flexible, comprehensive, relationship-based approach to of mobility, big data, and cloud computing are fundamentally personalized support and management of heterogeneous data changing how you deliver information, and how technology is centers. Datacenter Care is a structured framework of repeatable, implemented, moving closer to unconstrained access to IT. tested, and globally available services “building blocks.” You have an account support manager (ASM) who knows your business and your IT is delivered as services anywhere, across hybrid deployments of IT environment, and who can help you select the services you need private, managed, and public cloud, as well as traditional IT. It’s what from an extensive portfolio of support and consulting services. The HP is developing as the Converged Cloud, and it can finally allow ASM leverages our experience in supporting complex environments, enterprises to achieve business agility, with choice and improved global support partnerships, and technical expertise. ROI. Today, HP is a leader in the industry for support services, for customers worldwide who need to keep their systems running, So you get exactly the services you need—when and where you reduce costs, and avoid issues.
    [Show full text]
  • The Cloud-Enabled Data Center
    A Revolutionary Technology Extending the Ultra-Broad Functionality of Ethernet White Paper May 2013 The Cloud-Enabled Data Center The Cloud-Enabled Data Center Introduction A growing number of organizations are adopting some form of cloud computing to meet the challenges of rapidly deploying their IT services and addressing their dynamic workload environments while maximizing their IT return on investments (ROIs). Cloud computing gives users the ability to access the IT resources faster than traditional and virtual servers. It also provides improved manageability and requires less maintenance. By deploying technology as a service, your users access only the resources they need for a specific task, which prevents you from incurring costs for computing resources not in use. In addition, developing a cloud-enabled data center can improve operational efficiencies while reducing operational expenses by 50%. Panduit, the leader in Unified Physical Infrastructure offerings, and IBM, a pioneer in delivering cloud computing solutions to clients, have joined forces to deliver optimized, custom and preconfigured solutions for the cloud- enabled data center. This white paper describes how network, storage, compute and operations are important factors to consider when deploying private and public cloud computing in the data center. Specifically, it examines integrated stack/pre- configured and custom cloud deployments. It also explains the importance of the physical infrastructure as the foundation in successful cloud deployment and maintenance. Finally, it showcases how IBM’s depth of experience in delivering systems and software for cloud solutions when combined with Panduit’s physical infrastructure expertise, provides a tremendous impact on room-level data center environmental and new-age topology.
    [Show full text]
  • Comparison of Availability Between Local and Cloud Storage Leviathan Security Group
    Comparison of Availability Between Local and Cloud Storage Leviathan Security Group limitless innovation. no compromise. Introduction The U.S. National Institute for Standards and Technology denes cloud computing as having ve essential characteristics: on-demand self- service for provisioning, network access, the use of virtual machines to provide servers, rapid elastic provisioning and release of servers, and metering capability on the service provided.1 This paper seeks to answer whether, from the perspective of availability of data, especially in the face of natural or manmade threats to data and access, cloud computing is able to provide a greater benet than local data storage. For the purposes of this discussion, local data storage will include arrangements where data is kept on business premises or in a nearby datacenter, such as a colocation facility or other rigidly-provisioned resource. We will rst examine the signicant dierentiator that cloud computing provides in this space, and then examine dierent scales of threats to availability to see whether local data storage or cloud data storage fares better against known historical threats. 2 The Cloud Dierentiator: Geographic Redundancy At its heart, cloud computing and cloud storage are exactly the same as computing and storage provided through a datacenter or SOHO server; the cloud is made of computers. The dierence between cloud- based storage and local storage is that using cloud-based storage allows replication between separate geographic regions. Indeed, the key feature of
    [Show full text]
  • Ovirt Storage Overview
    Ovirt Storage Overview Jun 8 th, 2012 Barak Azulay Storage overview – oVirt workshop 2011 1 Agenda ● Defining the problem ● Roadmap ● Storage Domain ● How to contribute ● Storage Pool ● Q&A ● Example ● Domain Classes ● Domain Types ● File Domains ● Block Domains ● SPM ● Thin Provisioning Storage overview – oVirt workshop 2011 2 Defining the problem ● The requirements ● Manage tens of thousands of virtual disk images ● Each image potentially accessible from hundreds (thousands?) of nodes ● Support both file based storage as well as raw block devices ● The assumptions ● Exclusive access when used ● Big (X GBs) ● Centralized manager (can be HA in and by itself) Storage overview – oVirt workshop 2011 3 Defining the problem - guidelines ● High level, image centered API ● Cluster safe ● High performance (not in data path) ● Highly available ● no single point of failure ● Continues working in the absence of the manager ● Backing storage agnostic Storage overview – oVirt workshop 2011 4 Storage Domain ● A standalone storage entity ● Stores the images and associated metadata (but not VMs) Only true persistent storage for VDSM Domain Storage overview – oVirt workshop 2011 5 Domain Classes ● Data ● Master ● ISO (NFS only) ● Backup (NFS only) ● Domain classes are planned for deprecation Storage overview – oVirt workshop 2011 6 Domain Types ● File Domains (NFS, local dir) ● Use file system features for segmentation ● Block Domains (iSCSI, FCP, FCoE, SAS, ...) ● Use LVM for segmentation ● Very specialized use of LVM Storage overview – oVirt workshop
    [Show full text]
  • The Cloud V. Data Center Decision
    SPECIAL REPORT The cloud v. data center decision COPYRIGHT ©2017 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CLOUD V. DATA CENTER DECISION TABLE OF CONTENTS 03 Cloud v. data center: Key trends for IT decision-makers 11 Infographic: Cloud use is growing, but the data center isn’t dead yet 12 Understanding the pros and cons of five cloud types 16 Five major pitfalls to avoid in a cloud migration 19 Multi-cloud is a messy reality, but there’s hope 23 Six reasons why companies hang on to their data centers 27 Has IT’s default setting switched from data center to cloud? 30 How hybrid cloud is strengthening Fitness First 2 COPYRIGHT ©2017 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CLOUD V. DATA CENTER DECISION CLOUD V. DATA CENTER: KEY TRENDS FOR IT DECISION-MAKERS BY CHARLES MCLELLAN Cloud-based compute, networking and storage infrastructure, and cloud-native applications, are now firmly on the radar of IT managers—be they in startups, small businesses or large enterprises. So much so that, whereas a few years ago the question facing CIOs was “Which workloads should I move to the cloud?”, it’s now becoming “Which, if any, workloads should I keep on-premises?”. While most organisations will probably end up pursuing a hybrid cloud strategy, it’s worth examining this turnaround, and the reasons behind it. The general background, as ZDNet has explored in recent special features, is the competitive pressure for organisations to undergo a digital transformation based on cloud-native applications and methods such as DevOps, in pursuit of improved IT and organisational performance.
    [Show full text]
  • Amazon Web Services (AWS) Is Committed
    The Cloud Amazon Web Services (AWS) is committed to running our business in the most environmentally friendly way possible and achieving 100% renewable energy usage for our global infrastructure. AMAZON SUSTAINABILITY ENVIRONMENT 44 Learn how AWS is working to achieve Amazon’s goal of 100% renewable energy. JAN 2016 JAN Amazon launches Wind Farm JUL 2015 AWS announces Fowler Ridge, marking the first that it has contract- of our four announced renew- APR 2015 Amazon announces joining ed with Iberdrola able energy projects to move the American Council on Renewables, LLC into full operation. Renewable Energy (ACORE) to construct and op- and will participate in erate Amazon Wind JUN 2016 AWS and Dominion the U.S. Partnership for Farm U.S. East. Virginia Power join forces Renewable Energy Finance on a landmark renewable (U.S. PREF) to increase our energy delivery deal. work with state and federal NOV 2015 NOV With this, Dominion Vir- policymakers and other AWS announces that it ginia Power will manage stakeholders to enable more has contracted with EDP and integrate the energy renewable energy opportu- Renewables to construct produced from various nities for cloud providers. and operate Amazon Wind Amazon wind and solar OCT 2016 Farm U.S. Central. Amazon Solar Farm U.S. farm projects onto the East is now in production grid that serves AWS in Accomack County, data centers. Virginia. 2014SEP 2015 2015 2016 Amazon joins The Buyers’ Princi- NOV 2016 NOV ples to collaborate with more than AWS announces five new solar farms across the Common- NOV 2014 NOV AWS shares 40 other companies on making wealth of Virginia.
    [Show full text]
  • All About Cloud
    Everything as a service HP’s point of view on cloud computing and cloud services Rebecca Lawson April 2010 1 Everything as a Service A world of information, opportunities and experiences—from computing power to business processes to personal interactions, are delivered wherever, however and whenever you need it. 2 It’s All About the Service Service providers Service consumers Field engineer Business Finance services executive Campaign director Application Sales person services Logistics manager Data Call center services representative App developer Infrastructure QA engineer services Service manager 3 Driving Outcomes That Matter Technology- Business enabled Business Outcomes Strategy services Improve value Become more agile Enable innovation 4 Source and Govern Services That Result in Outcomes That Matter Cloud service IT organization Outcomes that providers Strategic service broker matter Hosted/managed Accelerate growth service providers Services Service Services Lower costs Network service sourced portfolio delivered providers Mitigate risk Internal service providers 5 Perspective on the IT Service Supply Chain Cloud service provider IT organization Global-class Service portfolio software Business users Massive scale-out infrastructure S S S S S Business S outcome Enterprise-class Hosted, managed, software outsourced service provider S Dedicated / shared Enterprise-class infrastructure software Dedicated / shared infrastructure 6 The Real Question: Which Services, From Which Source? Corporate website service Sales forecasting service E-mail service Linux Dev lab service Supply Chain service 7 Cloud Services Deliver New Kinds of Value Service providers Service consumers Cloud services are highly scalable and elastic technology-enabled services, delivered and consumed over the internet through an as-needed, pay-per-use business model.
    [Show full text]
  • Pi DATACENTERS
    Case Study Data Center Modernization Pi DATACENTERS As an enterprise-class cloud service provider, Pi DATACENTERS wanted to offer its clients a transparent, cost-effective and technically superior experience. By selecting SUSE® OpenStack Cloud, the company gained a cost-effective and open solution, backed by enterprise support from SUSE. With its “@PiCloud™” platform powered by SUSE OpenStack Cloud in place, Pi DATACENTERS provides robust, yet optimized, IaaS, PaaS, DRaaS and a host of other cloud-enabled services, allowing its enterprise customers to concentrate on their businesses, not IT. Mr. Sunder Muthevi Overview Challenge Founded in 2014, Pi DATACENTERS is an As a new business entering the enterprise- enterprise-class cloud service provider, class cloud service provider sector, Pi based out of Amaravati, the capital of the DATACENTERS wanted to provide clients newly reorganized state of Andhra Pra- with a completely different experience desh, India. As a state-of-the-art, green- from existing operators. Many competing field data center, the company offers a full public clouds lacked a data center in India, spectrum of solutions across Infrastructure and could therefore not provide transpar- Pi DATACENTERS at a Glance as a Service (IaaS), Platform as a Service ency about where data was physically Pi DATACENTERS is an enterprise-class cloud (PaaS), and Disaster Recovery as a Service located. Pi DATACENTERS knew that it service provider with clients in the government, (DRaaS), along with a host of other cloud- could provide a more personalized, local, retail and IT sectors amongst others. enabled services riding on its “@PiCloud™” and economical service, but needed to platform.
    [Show full text]
  • F5 Application Delivery Services in the Google Cloud
    OVERVIEW F5 APPLICATION DELIVERY SERVICES IN THE GOOGLE CLOUD Public cloud vendors offer enterprises increased scalability and flexibility, along with a reduction in infrastructure and operational costs. As a result, 89 percent of companies are housing part of their application portfolio in the public cloud.1 Whether located in the public cloud, private cloud, or an on-premises data center, applications require specific services to ensure their security, availability, and performance. F5® BIG-IP® virtual editions (VEs) provide all of these benefits. Now fully integrated into the Google Cloud Engine, BIG-IP VEs extend F5’s application delivery capabilities beyond that of the traditional data center perimeter. KEY BENEFITS CHALLENGE • Cut costs by scaling in the cloud, Infinite scalability, unmatched flexibility, and reduced overheads make computing in the public cloud not on premises seem like the perfect IT solution. However, many enterprises making the shift to the cloud do so • Protect customer data anywhere amidst concerns that their applications’ security and performance may be diminished, or that they’ll within a hybrid cloud architecture fall victim to vendor lock-in and incur large re-architecting costs. This is a common fear, with a recent • Easily move workloads between study finding that 78 percent of IT decision makers worry about the portability of their workloads in Google Cloud and data centers the cloud.2 Increased network segregation and inconsistent application services across hybrid cloud • Maintain high availability of web architectures are also placing additional strain on IT departments while generating new security applications vulnerabilities for attackers to take advantage of. But it doesn’t need to be this way.
    [Show full text]
  • Multi-Site Openstack Deployment Options & Challenges for Telcos
    MULTI-SITE OPENSTACK DEPLOYMENT OPTIONS & CHALLENGES FOR TELCOS Azhar Sayeed Chief Architect [email protected] DISCLAIMER Important Informaon The informaon described in this slide set does not provide any commitments to roadmaps or availability of products or features. Its inten+on is purely to provide clarity in describing the problem and drive a discussion that can then be used to drive open source communi+es Red Hat Product Management owns the roadmap and supportability conversaon for any Red Hat product 2 AGENDA • Background: OpenStack Architecture • Telco Deployment Use case • Distributed deployment – requirements • Multi-Site Architecture • Challenges • Solution and Further Study • Conclusions 3 OPENSTACK ARCHITECTURE WHY MULTI-SITE FOR TELCO? • Compute requirements – Not just at Data Center • Mul+ple Data Centers • Managed Service Offering • Managed Branch Office • Thick vCPE • Mobile Edge Compute • vRAN – vBBU locaons • Virtualized Central Offices • Hundreds to thousands of locaons • Primary and Backup Data Center – Disaster recovery • IoT Gateways – Fog compung 6 Centrally managed Compute closer to the user Multiple DC or Central Offices Independent OpenStack Deployments Remote Sites E2E Orchestrator • Hierarchical Connec+vity model of CO • Remote sites with compute Security & Firewall requirements Quality of Service (QoS) • Extend OpenStack to these sites Traffic Shaping Overlay Device Management Tunnel over Internet Main Data Center Backup Data Center A typical service almost always spans across mulple DCs Remote Data 7 Centers
    [Show full text]
  • Emerging Indonesian Data Center Market and Energy Efficiency Opportunities
    THE EMERGING INDONESIAN DATA CENTER MARKET AND ENERGY EFFICIENCY OPPORTUNITIES ASIAN DEVELOPMENT BANK THE EMERGING INDONESIAN DATA CENTER MARKET AND ENERGY EFFICIENCY OPPORTUNITIES April 2017 ASIAN DEVELOPMENT BANK Creative Commons Attribution 3.0 IGO license (CC BY 3.0 IGO) © 2017 Asian Development Bank 6 ADB Avenue, Mandaluyong City, 1550 Metro Manila, Philippines Tel +63 2 632 4444; Fax +63 2 636 2444 www.adb.org Some rights reserved. Published in 2017. ISBN 978-92-9257-799-5 (Print), 978-92-9257-800-8 (e-ISBN) Publication Stock No. TCS178743 DOI: http://dx.doi.org/10.22617/TCS178743 The views expressed in this publication are those of the authors and do not necessarily reflect the views and policies of the Asian Development Bank (ADB) or its Board of Governors or the governments they represent. ADB does not guarantee the accuracy of the data included in this publication and accepts no responsibility for any consequence of their use. The mention of specific companies or products of manufacturers does not imply that they are endorsed or recommended by ADB in preference to others of a similar nature that are not mentioned. By making any designation of or reference to a particular territory or geographic area, or by using the term “country” in this document, ADB does not intend to make any judgments as to the legal or other status of any territory or area. This work is available under the Creative Commons Attribution 3.0 IGO license (CC BY 3.0 IGO) https://creativecommons.org/licenses/by/3.0/igo/. By using the content of this publication, you agree to be bound by the terms of this license.
    [Show full text]