SPARC64-III User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

SPARC64-III User's Guide SPARC64-III User’s Guide HAL Computer Systems, Inc. Campbell, California May 1998 Copyright © 1998 HAL Computer Systems, Inc. All rights reserved. This product and related documentation are protected by copyright and distributed under licenses restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form by any means without prior written authorization of HAL Computer Systems, Inc., and its licensors, if any. Portions of this product may be derived from the UNIX and Berkeley 4.3 BSD Systems, licensed from UNIX System Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and the University of California, respectively. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the United States Government is subject to the restrictions set forth in DFARS 252.227-7013 (c)(1)(ii), FAR 52.227-19, and NASA FAR Supplement. The product described in this book may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS HAL, the HAL logo, HyperScalar, and OLIAS are registered trademarks and HAL Computer Systems, Inc. HALstation 300, and Ishmail are trademarks of HAL Computer Systems, Inc. SPARC64 and SPARC64/OS are trademarks of SPARC International, Inc., licensed by SPARC International, Inc., to HAL Computer Systems, Inc. Fujitsu and the Fujitsu logo are trademarks of Fujitsu Limited. All SPARC trademarks, including the SCD Compliant Logo, are trademarks or registered trademarks of SPARC International, Inc. SPARCstation, SPARCserver, SPARCengine, SPARCstorage, SPARCware, SPARCcenter, SPARCclassic, SPARCcluster, SPARCdesign, SPARC811 SPARCprinter, UltraSPARC, microSPARC, SPARCworks, and SPARCompiler are licensed exclusively to Sun Microsystems, Inc. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. UNIX is a registered trademark of Novell, Inc., in the United States and other countries, licensed exclusively through the X/OPEN Company, Ltd. All other product names mentioned herein are the trademarks of their respective owners. THIS PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. THIS PUBLICATION COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN; THESE CHANGES WILL BE INCORPORATED IN NEW EDITIONS OF THE PUBLICATION. HAL COMPUTER SYSTEMS, INC. MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED IN THIS PUBLICATION AT ANY TIME. SPARC64-III User’s Guide Internal part number 620-00205-A Reorder document number 620-00205-A May 1998 HAL Computer Systems, Inc. A Fujitsu Company 1315 Dell Avenue Campbell, CA 95008 http://www.hal.com Contents 1 Overview .......................................................................................................................... 11 1.1 Notes About This Book ........................................................................................... 11 1.2 SPARC64-III Architecture ...................................................................................... 17 2 Definitions ........................................................................................................................ 21 SPARC-V9 Terms ................................................................................................... 21 SPARC64-III Implementation-Specific Terms ....................................................... 26 3 Architectural Overview .................................................................................................. 31 3.1 SPARC-V9 Processor Architecture ........................................................................ 31 3.2 Instructions .............................................................................................................. 33 3.3 Traps ........................................................................................................................37 3.4 SPARC64-III Processor Architecture ..................................................................... 38 4 Data Formats ................................................................................................................... 51 4.1 Signed Integer Byte ................................................................................................. 52 4.2 Signed Integer Halfword ......................................................................................... 52 4.3 Signed Integer Word ............................................................................................... 52 4.4 Signed Integer Double ............................................................................................. 52 4.5 Signed Extended Integer ......................................................................................... 53 4.6 Unsigned Integer Byte ............................................................................................. 53 4.7 Unsigned Integer Halfword ..................................................................................... 53 4.8 Unsigned Integer Word ........................................................................................... 53 4.9 Unsigned Integer Double ........................................................................................ 54 4.10 Unsigned Extended Integer ..................................................................................... 54 4.11 Tagged Word ........................................................................................................... 54 4.12 Floating-point Single Precision ............................................................................... 54 4.13 Floating-point Double Precision ............................................................................. 55 4.14 Floating-point Quad-precision ................................................................................ 55 5 Registers ........................................................................................................................... 59 5.1 Nonprivileged Registers .......................................................................................... 60 5.2 Privileged Registers ................................................................................................. 82 4 Contents 6 Instructions ...................................................................................................................... 107 6.1 Instruction Execution .............................................................................................. 107 6.2 Instruction Formats .................................................................................................. 111 6.3 Instruction Categories .............................................................................................. 116 6.4 Register Window Management ............................................................................... 133 7 Traps ................................................................................................................................. 137 7.1 Overview ................................................................................................................. 137 7.2 Processor States, Normal and Special Traps ........................................................... 137 7.3 Trap Categories ....................................................................................................... 142 7.4 Trap Control ............................................................................................................ 146 7.5 Trap-table Entry Addresses ..................................................................................... 147 7.6 Trap Processing ....................................................................................................... 153 7.7 Exception and Interrupt Descriptions ...................................................................... 161 8 Memory Models ............................................................................................................... 169 8.1 Introduction ............................................................................................................. 169 8.2 Memory, Real Memory, and I/O Locations ............................................................ 173 8.3 Addressing and Alternate Address Spaces .............................................................. 174 8.4 SPARC-V9 Memory Model .................................................................................... 176 9 Guidelines for Instruction Scheduling .......................................................................... 185 9.1 Introduction ............................................................................................................. 185 9.2 Instruction Fetch ...................................................................................................... 187 9.3 Branches and Branch Prediction ............................................................................. 190 9.4 Instruction Issue ...................................................................................................... 194 9.5 Instruction Dispatch, and the DFM Queue .............................................................. 195 9.6 Data Flow Unit ........................................................................................................ 198
Recommended publications
  • Validated Products List, 1995 No. 3: Programming Languages, Database
    NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management.
    [Show full text]
  • The Conference Program Booklet
    Austin Convention Center Conference Austin, TX Program http://sc15.supercomputing.org/ Conference Dates: Exhibition Dates: The International Conference for High Performance Nov. 15 - 20, 2015 Nov. 16 - 19, 2015 Computing, Networking, Storage and Analysis Sponsors: SC15.supercomputing.org SC15 • Austin, Texas The International Conference for High Performance Computing, Networking, Storage and Analysis Sponsors: 3 Table of Contents Welcome from the Chair ................................. 4 Papers ............................................................... 68 General Information ........................................ 5 Posters Research Posters……………………………………..88 Registration and Conference Store Hours ....... 5 ACM Student Research Competition ........ 114 Exhibit Hall Hours ............................................. 5 Posters SC15 Information Booth/Hours ....................... 5 Scientific Visualization/ .................................... 120 Data Analytics Showcase SC16 Preview Booth/Hours ............................. 5 Student Programs Social Events ..................................................... 5 Experiencing HPC for Undergraduates ...... 122 Registration Pass Access .................................. 7 Mentor-Protégé Program .......................... 123 Student Cluster Competition Kickoff ......... 123 SCinet ............................................................... 8 Student-Postdoc Job & ............................. 123 Convention Center Maps ................................. 12 Opportunity Fair Daily Schedules
    [Show full text]
  • Intellectual Property Report
    2009 Intellectual Property Report FUJITSU LIMITED 1. Introduction This Intellectual Property Report has been available on the Internet since 2006 to provide our shareholders and the general public with information on Fujitsu’s efforts concerning intellectual properties. Our efforts in intellectual properties are extensive. We collectively call these efforts our intellectual property strategy. Fujitsu’s principal business is manufacturing and selling communication systems, information processing systems, and electronic devices as well as providing services involving these products. Each phase of these business activities is closely tied to our intellectual property strategy. This Intellectual Property Report describes the role of Fujitsu’s intellectual property strategy and the efforts being made in this area by our individual business units. It also includes statistics covering our intellectual properties. (Intellectual Property General Manager Takashi Iwata) ■ Role of our intellectual property strategy At Fujitsu, our intellectual property and standardization strategies have been integrated with our business strategy and research and development strategy as a part of our efforts to secure business competitive advantages, business flexibility, and business earnings. By taking action to support our technologies as intellectual properties, we have differentiated our products and services more effectively from those of our competitors to secure our business competitive advantage. We have also ensured our business flexibility by partnering with other companies under favorable terms. Furthermore, we have planned and implemented our intellectual property strategy together with our standardization strategy to secure business profitability through our licensing and related activities. Also, it is important for business management to be conscious of intellectual property issues and to be positively committed to using intellectual properties in the course of running our business.
    [Show full text]
  • Fujitsu AR'99(E)
    50p10/66p2 50p10/66p2 FUJITSU LIMITED FUJITSU LIMITED Annual Report Annual Report 1999 ©1999 6-1, Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-8211, Japan Printed in Japan Telephone: +81-3-3213-4160 BA0013-1M Facsimile: +81-3-3216-9365 This annual report is Homepage URL: http://www.fujitsu.co.jp/index-e.html printed on recycled paper. C4 C1 50p10/66p2 50p10/66p2 Shareholders’ Data 49 CONTENTS Capital: ¥261,222 million Common Stock: Authorized: 5,000,000,000 shares 1 Consolidated Financial Highlights Issued: 1,884,139,404 2 To Our Shareholders Number of Shareholders: 156,110 Percentage of Number of shares total shares 6 Special Feature—Solutions Business Principal Shareholders held (thousands) outstanding 12 State of Readiness for Year 2000 Fuji Electric Co., Ltd. 237,963 12.6% Asahi Mutual Life Insurance Company 117,172 6.2% 13 Consolidated Net Sales and Operating Income The Dai-Ichi Kangyo Bank, Limited 76,817 4.1% by Segment The Sumitomo Trust and Banking Company, Limited (Trust services) 60,851 3.2% 14 Environmental and Social Activities The Chase Manhattan Bank NA London (Standing proxy: The Fuji Bank, Ltd.) 46,437 2.5% 18 Board of Directors and Auditors The Industrial Bank of Japan, Limited 42,202 2.2% 19 Five-Year Summary The Chuo Trust and Banking Company, Limited (Trust services) 38,284 2.0% 20 Management’s Discussion and Analysis of Operations The Mitsubishi Trust and Banking Corporation (Trust services) 38,024 2.0% 24 Consolidated Balance Sheets The Asahi Bank, Ltd. 29,221 1.6% 26 Consolidated Statements of Operations The Sakura Bank, Ltd.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Fujitsu Philippines Offers Nationwide Coverage
    VOL. 5 NO. 2 Second Quarter 2003 Fujitsu Philippines offers nationwide coverage FPI establishes a network of Regional Support Offices (RSOs) strategically located in different parts of the country with a goal to meet the increasing market demand for a service provider with a wide service coverage and a strong support structure. FPI’s Regional Support Office at Subic Bay ith improvements in technology, especially in data FPI customers. The RSO engineer acts as the first line of support for customers within the communications and in the Internet, the dream of a true This move differentiates FPI from the rest RSO territory. Additional engineers are distributed computing is now a reality. Technology enables of the ICT service providers. The RSOs dispatched temporarily to the territory W enable FPI to offer its clients a range of as needed to help the RSO engineers enterprises to transact and interact directly with their end-users - a boon service options, such as next-business- cope with peaks in their workload. The to consumers but a major management challenge for ICT infrastructure day up to two hours on-site response time Makati-based RSO coordinator takes managers. on a 24 x 7 basis. The RSOs also enable care of all operational and administrative FPI to serve its existing clients with concerns of the RSO engineers and Due to the infrastructure’s customer- provider with wide service coverage and provincial branches more effectively, these concerns are escalated to the Field oriented role, a severe and a demanding a strong support structure. increase FPI’s service coverage, and Support Group Head if necessary.
    [Show full text]
  • Energy-Effective Issue Logic
    Energy-Effective Issue Logic Daniele Folegnani and Antonio GonzaJez Departament d'Arquitectura de Computadors Universitat Politecnica de Catalunya Jordi Girona, 1-3 Mbdul D6 08034 Barcelona, Spain [email protected] Abstract require an increasing computing power, which sometimes is achieved through higher clock frequencies and more sophisticated Tile issue logic of a dynamically-scheduled superscalar processor architectural techniques, with an obvious impact on power is a complex mechanism devoted to start the execution of multiple consumption. instructions eveo' cycle. Due to its complexity, it is responsible for a significant percentage of the energy consumed by a With the fast increase in design complexity and reduction in microprocessor. The energy consumption of the issue logic design time, new generation CAD tools for VLSI design like depends on several architectural parameters, the instruction issue PowerMill [13] and QuickPower [12] are crucial to evaluate the queue size being one of the most important. In this paper we energy consumption at different points of the design, helping to present a technique to reduce the energy consumption of the issue make important decisions early in the design process. The logic of a high-performance superscalar processor. The proposed importance of a continuous feedback between the functional technique is based on the observation that the conventional issue system description and the power impact requires better and faster logic wastes a significant amount of energy for useless activio,. In evaluation tools and models to introduce changes rapidly through particular, the wake-up of empty entries and operands that are various design scenarios. Recent research has shown how read)' represents an important source of energy waste.
    [Show full text]
  • Eco-Friendly Products
    Leading-Edge Green ICT Research and Development We are concerned with reducing environmental burdens from the initial policy formulation stages in our leading-edge research and development, and are continuously creating technologies that contribute to saving energy and the use of next-generation sources of energy. Basic Approach Promote the Development of Products and Services that Contribute to Lower Environmental Burdens To achieve the goal of reducing CO2 emissions by about 30 million tons a year in Japan by 2020, as proposed in our medium-term environmental vision Green Policy 2020, we need to develop revolutionary leading-edge technologies that are even more effective at reducing environmental impact. Fujitsu Laboratories Ltd., which handles the Fujitsu Group's leading-edge green ICT R&D, has introduced the slogan "Further strengthen leading-edge green ICT R&D and contribute even more to Fujitsu Group business," and is pushing forward with R&D on technologies that can help lower environmental burdens. Based on the concept of Green R&D, we are establishing and implementing policies from an environmental standpoint in all development work, from materials and devices through to facilities, systems and solutions. Initiatives in FY 2011 Quantitatively Evaluating CO2 Emissions Reduction Benefits from the R&D Stage To accelerate our environmentally oriented R&D, for all of our leading-edge technologies being developed, starting from the initial R&D phases, Fujitsu Laboratories promotes initiatives to quantitatively evaluate the benefits in reduced CO2 emissions (i.e., the environmental contribution) to be expected from the use of its products and services. These efforts are implemented across all units in our laboratories, and since researchers can evaluate the technologies they are responsible for, we can clarify the main advantages of the technologies from an environmental standpoint.
    [Show full text]
  • European Semiconductor Industry Service (ESIS) Have Received This Data As a Loose-Leaf Service Section to Be Filed in Their Binder Set
    DataQuest a company of MThe Dun & Bradstreet Corporation 7th April Dear Client, NEW FORMAT—MARKET SHARE DATA Dataquest's Eviropean Components Group completed preliminary 1988 European semiconductor market share estimates, which are enclosed herein. In the past, clients of the European Semiconductor Industry Service (ESIS) have received this data as a loose-leaf service section to be filed in their binder set. For your convenience we are now publishing this data in the form of a booklet. This booklet can still be filed as before, but offers much greater ease of use "on the move". We have also presented the market share estimates in a ranked format, rather than in alphabetical format, for your ease in comparing of vendors' market positions in different products and technologies. The previous year's rank is also shown for reference. Extra analysis is given, such as percentage market share for each vendor, for further ease in interpreting the estimates. We hope this helps make our estimates more usefuL to you. We would be interested in your comments regarding this new format. Yours sincerely %Y^^ • Bypon Harding Research Analyst European Components Group. 1290 Ridder Park Drive, San Jose, CA 95131-2398 (408) 437-8000 Telex 171973 Fax (408) 437-0292 European Semiconductor Industry Service Volume III—Companies E)ataQuest nn acompanyof IISI TheDun&Biadstreetcorporation 12^ Ridder Park Drive San Jose, California 95131-2398 (408) 437-8000 Telex: 171973 I^: (408) 437-0292 Sales/Service Offices: UNITED KINGDOM FRANCE EASTERN U.S. Dataquest Europe Limited Dataquest Europe SA Dataquest Boston Roussel House, Tour Gallieni 2 1740 Massachusetts Ave.
    [Show full text]
  • Data Locality Optimizations for Multigrid Methods on Structured Grids
    Data Locality Optimizations for Multigrid Methods on Structured Grids Christian Weiß Technische Universitat¨ Munchen¨ Institut fur¨ Informatik Lehrstuhl fur¨ Rechnertechnik und Rechnerorganisation Data Locality Optimizations for Multigrid Methods on Structured Grids Christian Weiß Vollst¨andiger Abdruck der von der Fakult¨at f¨ur Informatik der Technischen Universit¨at M¨unchen zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) genehmigten Dissertation. Vorsitzender: Univ.-Prof. Dr. Hans Michael Gerndt Pr¨ufer der Dissertation: 1. Univ.-Prof. Dr. Arndt Bode 2. Univ.-Prof. Dr. Ulrich R¨ude Friedrich-Alexander-Universit¨at Erlangen-N¨urnberg 3. Univ.-Prof. (komm.) Dr.-Ing. Eike Jessen, em. Die Dissertation wurde am 26. September 2001 bei der Technischen Universit¨at M¨unchen eingereicht und durch die Fakult¨at f¨ur Informatik am 06. Dezember 2001 angenommen. Abstract Beside traditional direct solvers iterative methods offer an efficient alternative for the solution of systems of linear equations which arise in the solution of partial differen- tial equations (PDEs). Among them, multigrid algorithms belong to the most efficient methods based on the number of operations required to achieve a good approximation of the solution. The relevance of the number of arithmetic operations performed by an application as a metric for the complexity of an algorithm wanes since the performance of modern computing systems nowadays is limited by memory latency and bandwidth. Consequently, almost all computer manufacturers nowadays equip their computers with cache–based hierarchical memory systems. Thus, the efficiency of multigrid methods is rather determined by good data locality, i.e. good utilization of data caches, than by the number of arithmetic operations.
    [Show full text]
  • Architektura Procesorů Ultrasparc
    Architektura procesorů UltraSPARC Pokročilé architektury počítačů Prosinec 2009 Pavel Juška, jus011 OBSAH 1. Architektura procesorů SPARC........................................................................................................3 1.1 Charakteristika...........................................................................................................................4 1.2 Historie.......................................................................................................................................4 1.3 Specifikace.................................................................................................................................6 1.4 Operační systémy.......................................................................................................................7 1.5 Superpočítače.............................................................................................................................7 2. Zdroje...............................................................................................................................................8 1. ARCHITEKTURA PROCESORŮ SPARC SPARC (Scalable Processor Architecture) je architektura procesorů založená na RISC instrukční sadě, kterou vyvinula firma Sun Microsystems a byla představena v roce 1986. SPARC je registrovaná ochranná známka společnosti SPARC International, Inc, což je organizace založená v roce 1989 na podporu architektury SPARC, která zároveň provádí testování v rámci dodržování standardů. Implementace původní 32-bitové
    [Show full text]
  • Fujitsu Technology and Service Vision 2017 Book 2
    Fujitsu Technology and Service Vision 2017 Book 2 Table of contents Technology Concept Connected Services for Digital Co-creation 3 Technology in the Digital Era 12 Delivering Business Outcomes with IoT 5 Technology Leaders Agenda 14 Human Centric AI Zinrai 6 Connected Services 16 Hybrid IT 7 MetaArc 18 Security for Business Growth and Cyber Security 8 Industry Digital Transformation 20 Future Technology 10 Digital Workforce and Workstyle Transformation Digital Transformation Stories Driving innovation by Digital Co-creation The Institute of Sanitary Research of the San Carlos Clinical Hospital / Hospital Clínico, Madrid 22 Revolutionizing clinical decision-making using artificial intelligence Fukuoka Financial Group, Inc. / iBank marketing Co., Ltd. 24 Driving ecosystem-based businesses harnessing Fintech to attract younger customers INESA (Group) Co., Ltd. 26 Evolution toward a true Smart Factory has begun TOMOE Corporation 28 Augmented Reality (AR) boosts the efficiency of assembly inspection Australia Post 30 Australia Post and Fujitsu collaborate to deliver a range of IT services Optex Co., Ltd. 32 IoT Platform enables rapid development of new services and business model transformation HomeServe USA 34 New organizational culture and business model created by implementing digital technology METAWATER Co., Ltd. 36 Delivering new value with the latest cloud as a water business platform S Group / ABC Petrol 38 Co-creation of an innovative payment application that connects with existing software Qol Co., Ltd. 40 Deploying a health information
    [Show full text]