Securing Your Critical Workloads with IBM Hyper Protect Services

Total Page:16

File Type:pdf, Size:1020Kb

Securing Your Critical Workloads with IBM Hyper Protect Services Front cover Securing Your Critical Workloads with IBM Hyper Protect Services Barry Silliman Sandeep Sarkar Diana Henderson Sarath Chandra Mekala Elton de Souza Vasfi Gucer Jin VanStee Qi Ye Jordan Cartwright Madhuri Gangireddy Matt Mondics Matthew Arnold Ravi Kumar Gullapalli Sandeep Ambekar Redbooks IBM Redbooks Securing Your Critical Workloads with IBM Hyper Protect Services March 2020 SG24-8469-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (March 2020) This edition applies to IBM Hyper Protect Virtual Servers V1.2.0, IBM Hyper Protect Crypto Services V1.0.0 and IBM Hyper Protect DBaaS V1.0.0 © Copyright International Business Machines Corporation 2020. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. .x Now you can become a published author, too! . xiii Comments welcome. xiii Stay connected to IBM Redbooks . xiv Chapter 1. Introduction to IBM Hyper Protect Services . 1 1.1 Industry and IBM Hyper Protect Services portfolio overview . 2 1.2 Hyper Protect Crypto Services . 2 1.3 Hyper Protect Database as a Service . 3 1.4 Hyper Protect Virtual Servers . 4 1.5 Hyper Protect Virtual Servers (on-premises). 5 1.5.1 Building images with integrity: Securing continuous integration and continuous delivery . 6 1.5.2 Managing infrastructure with least privilege access to applications and data. 6 1.5.3 Deploying images with trusted provenance . 6 1.6 Security features . 6 1.6.1 Cryptography . 7 1.6.2 IBM Secure Service Container . 9 Chapter 2. IBM Cloud Hyper Protect Crypto Services. 29 2.1 Overview . 30 2.2 Creating an instance of Hyper Protect Crypto Services on the public IBM Cloud. 30 2.2.1 Creating an instance by using the IBM Cloud console . 31 2.2.2 Getting your service instance ready for use . 37 2.3 Using the Key Management Services feature of Hyper Protect Crypto Services . 59 2.3.1 Creating a root key . 59 2.3.2 Creating a standard key . 64 2.3.3 Wrapping a standard key . 66 2.3.4 Unwrapping a standard key . 67 2.3.5 Importing a key as a root key . 68 2.3.6 Importing a key as a standard key . 71 2.3.7 Listing all keys. 74 2.3.8 Listing a specific key . 78 2.4 Using the GREP11 feature of Hyper Protect Crypto Services . 81 2.4.1 Functions available with the GREP11 API . 83 2.5 Code examples . 86 2.5.1 Setting up the GREP11 API . 86 2.5.2 GREP11 code examples. 86 2.6 Hyper Protect Crypto Services use cases. 92 2.6.1 Protecting IBM Cloud services . 92 2.6.2 Using the GREP11 API. 93 Chapter 3. IBM Cloud Hyper Protect DBaaS. 95 3.1 Introduction to IBM Cloud Hyper Protect DBaaS . 96 3.2 Sizing and topology. 97 © Copyright IBM Corp. 2020. All rights reserved. iii 3.3 Public Cloud Service instantiation. 98 3.3.1 Prerequisites . 98 3.3.2 Web Interface . 98 3.3.3 IBM Cloud CLI. 100 3.3.4 Hyper Protect DBaaS RESTful API. 103 3.4 Administration and operations. 105 3.4.1 Managing a Hyper Protect DBaaS Service. 105 3.4.2 Managing database instances . 106 3.4.3 Managing database users. 106 3.4.4 Logging and monitoring . 107 3.4.5 Back up and restore . 111 3.5 Security and compliance . 114 3.6 Use case: Encrypting databases with your keys protected. 114 3.7 API interaction and code samples. 115 3.7.1 Cloning the GitHub example Python code . 116 3.7.2 Setting up a Python virtual environment with requests . 116 3.7.3 Running the example file . 117 Chapter 4. IBM Cloud Hyper Protect Virtual Servers. 119 4.1 Introduction to IBM Cloud Hyper Protect Virtual Servers . 120 4.2 IBM Cloud Hyper Protect Virtual Servers use cases. 120 4.3 Public Cloud service instantiation . 121 Chapter 5. IBM Hyper Protect Virtual Servers on-premises . 125 5.1 Introduction to IBM Hyper Protect Virtual Servers on-premises . 126 5.2 IBM Hyper Protect Virtual Servers key features . 127 5.2.1 Trusted CI/CD . 128 5.2.2 GREP11 . 129 5.2.3 User management . 130 5.2.4 Bring Your Own Image . 130 5.2.5 Encryption . 130 5.3 IBM Hyper Protect Virtual Servers use cases . 131 5.4 IBM Hyper Protect Virtual Servers architecture overview . 133 5.5 A sample use case: Hyper Protect Virtual Server for secure storage . 138 5.5.1 Creating a Secure Storage Server in Hyper Protect Virtual Servers. 140 Chapter 6. IBM Hyper Protect.
Recommended publications
  • 1- BRUNEL: Welcome to Another Episode of Getting the Most
    BRUNEL: Welcome to another episode of Getting the Most Out of IBM U2. I'm Kenny Brunel, and I'm your host for today's episode, and today we're going to talk about IBM U2's latest technology, U2.NET. First of all, what is .NET? So I'm going to turn my attention, first of all, to a guest that I have in the studio with me today in Denver, Dave Peters. Dave is the product manager for the U2 data servers and the client tools, and Dave has been with IBM for over 12 years. What can you tell us about U2.NET? But first of all could you give us a brief rundown or a description of what .NET is itself. PETERS: Sure, Kenny. .NET is really a development framework architected by Microsoft. This is the framework that Microsoft hopes that will be the development choice for any new development on Windows. It consists of user-defined interfaces, data access, database connectivity, cryptography, Web application development and communications. IBM has three options for U2 developers that want to access the U2 data servers using .NET. The first I'll mention is [UniObjects] for .NET or UO.NET. UO.NET is a MultiValue API for use in the .NET applications. It's very familiar within -1- the constructs and was introduced to help Basic programmers get to .NET very easily. And one good thing is it's simple to get. UO .NET is available on the client CD that comes with either UniVerse or UniData. The second option is, the long name is IBM database add-ins for Visual Studio or as we refer to it as IBM .NET.
    [Show full text]
  • Introduction to Managing Mobile Devices Using Linux on System Z
    Introduction to Managing Mobile Devices using Linux on System z SHARE Pittsburgh – Session 15692 Romney White ([email protected]) System z Architecture and Technology © 2014 IBM Corporation Mobile devices are 80% of devices sold to access the Internet Worldwide Shipment of Internet Access Devices 2013 2017 PC (Desktop & Notebook) PC (Ultrabook) Tablet Phone Worldwide Devices Shipments by Segment (Thousands of Units) Device Type 2012 2013 2014 2017 PC (Desk-Based and Notebook) 341,263 315,229 302,315 271,612 PC (Ultrabooks) 9,822 23,592 38,687 96,350 Tablet 116,113 197,202 265,731 467,951 Mobile Phone 1,746,176 1,875,774 1,949,722 2,128,871 Total 2,213,373 2,411,796 2,556,455 2,964,783 2 Source: Gartner (April 2013) © 2014 IBM Corporation Mobile Internet users will surpass PC internet users by 2015 The number of people accessing the Internet from smartphones, tablets and other mobile devices will surpass the number of users connecting from a home or office computer by 2015, according to a September 2013 study by market analyst firm IDC. PC is the new Legacy! 3 © 2014 IBM Corporation Five mobile trends with significant implications for the enterprise Mobile enables the Mobile is primary Internet of Things Mobile is primary 91% of mobile users keep Global Machine-to-machine 91% of mobile users keep their device within arm’s connections will increase their device within arm’s reach 100% of the time from 2 billion in 2011 to 18 reach 100% of the time billion at the end of 2022 Mobile must create a continuous brand Insights from mobile experience
    [Show full text]
  • System Tools Reference Manual for Filenet Image Services
    IBM FileNet Image Services Version 4.2 System Tools Reference Manual SC19-3326-00 IBM FileNet Image Services Version 4.2 System Tools Reference Manual SC19-3326-00 Note Before using this information and the product it supports, read the information in “Notices” on page 1439. This edition applies to version 4.2 of IBM FileNet Image Services (product number 5724-R95) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1984, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this manual 17 Manual Organization 18 Document revision history 18 What to Read First 19 Related Documents 19 Accessing IBM FileNet Documentation 20 IBM FileNet Education 20 Feedback 20 Documentation feedback 20 Product consumability feedback 21 Introduction 22 Tools Overview 22 Subsection Descriptions 35 Description 35 Use 35 Syntax 35 Flags and Options 35 Commands 35 Examples or Sample Output 36 Checklist 36 Procedure 36 May 2011 FileNet Image Services System Tools Reference Manual, Version 4.2 5 Contents Related Topics 36 Running Image Services Tools Remotely 37 How an Image Services Server can hang 37 Best Practices 37 Why an intermediate server works 38 Cross Reference 39 Backup Preparation and Analysis 39 Batches 39 Cache 40 Configuration 41 Core Files 41 Databases 42 Data Dictionary 43 Document Committal 43 Document Deletion 43 Document Services 44 Document Retrieval 44 Enterprise Backup/Restore (EBR)
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 108 CONGRESS, SECOND SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 108 CONGRESS, SECOND SESSION Vol. 150 WASHINGTON, WEDNESDAY, DECEMBER 8, 2004 No. 139 House of Representatives The House was not in session today. Its next meeting will be held on Tuesday, January 4, 2005, at 12 noon. Senate WEDNESDAY, DECEMBER 8, 2004 The Senate met at 9:30 a.m. and was generations. Thank You for Your pro- ple with issues and wisdom to seek called to order by the President pro tection. You make wars to cease, de- Your guidance. tempore (Mr. STEVENS). stroying the weapons of those who Bless and strengthen the many staff- fight against Your purposes. Today, ers who provide the wind beneath the PRAYER guide our lawmakers with Your justice wings of our leaders. Bring to them a The Chaplain, Dr. Barry C. Black, of- and keep them as the apple of Your bountiful harvest for their many fered the following prayer: eye. Instruct them in Your wisdom and months of faithful toil. Let us pray. hide them under the shadow of Your Bless all who mourn the loss of Stan Faithful God, who stretches out the wings. Help them to find light in Your Kimmitt. He will be greatly missed. Earth above the waters, Your Name is laws and knowledge in Your instruc- We pray this in Your holy Name. great and Your goodness extends to all tions. Give them patience as they grap- Amen. NOTICE If the 108th Congress, 2d Session, adjourns sine die on or before December 10, 2004, a final issue of the Congres- sional Record for the 108th Congress, 2d Session, will be published on Monday, December 20, 2004, in order to permit Members to revise and extend their remarks.
    [Show full text]
  • DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2
    Flash 6X9 / DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2 DB2 10.5 with BLU Acceleration 00-FM.indd 1 9/17/13 2:26 PM Flash 6X9 / DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2 00-FM.indd 2 9/17/13 2:26 PM Flash 6X9 / DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2 DB2 10.5 with BLU Acceleration Paul Zikopoulos Sam Lightstone Matt Huras Aamer Sachedina George Baklarz New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto 00-FM.indd 3 9/17/13 2:26 PM Flash 6X9 / DB2 10.5 with BLU Acceleration / Zikopoulos / 349-2 McGraw-Hill Education books are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative, please visit the Contact Us pages at www.mhprofessional.com. DB2 10.5 with BLU Acceleration: New Dynamic In-Memory Analytics for the Era of Big Data Copyright © 2014 by McGraw-Hill Education. All rights reserved. Printed in the Unit- ed States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of pub- lisher, with the exception that the program listings may be entered, stored, and exe- cuted in a computer system, but they may not be reproduced for publication. All trademarks or copyrights mentioned herein are the possession of their respective owners and McGraw-Hill Education makes no claim of ownership by the mention of products that contain these marks.
    [Show full text]
  • Cloud Computing Reference Architecture Ccra
    Cloud Computing Reference Architecture Ccra Sacroiliac Micah disorientates sleeplessly or slaved hypostatically when Rajeev is cerebrovascular. Pondering Meredeth outmoves obsequiously. Beforehand Hunter scoop very herpetologically while Ewan remains exarchal and sloping. Changing the security for the latest editions and computing reference architecture and components of cookies and reduce complexity by user data in hard anchor is offered by the That cloud computing reference architecture ccra bring flexibility in any cloud computing, private and ccra saves your email tools that includes enterprise. Build azure security best practices to look for services integrated with relevant papers in this request mated basis for next evolutionary step towards achieving higher and cloud. Dbms handle and ccra bring flexibility the client is the end up your. We log you should be realized by reference architecture describes an environment that cloud computing reference architecture ccra. We litter a sharing community. Cloud Computing Reference Architecture ITBusinessEdgecom. It costs and ccra and solution that cloud computing reference architecture ccra. Hybrid cloud infrastructure services will confirm a reference for developing in. Plan in order to permit the data center solution including more workloads quickly realize greater flexibility. The ccra and evaluated first to this was the provisioning of cloud computing reference architecture ccra and allow information describes a result of the cost advantage both. Another effort had made was simple improve the consumability of the RA. ICT Industry uses the NIST US National Institute of Standards Cloud Computing Reference Architecture CCRA 4 5 to sale the decision making process. ISOIEC 17792014 iTeh Standards. Request PDF CCRA Cloud Computing Reference Architecture As Cloud Computing has got more transparent more popular various Cloud.
    [Show full text]
  • Interoperability and the Need for Intelligent Software
    Sponsored by the Office of Naval Research (ONR) ONR Decision-Support Workshop Series Interoperability hosted by the Collaborative Agent Design Research Center (CADRC) Cal Poly State University, San Luis Obispo, CA Proceedings of Workshop held on September 8-9, 2004 at The Clubs at Quantico, Quantico Marine Base Quantico, VA November 2004 Interoperability and the Need for Intelligent Software Jens Pohl, Ph.D. Executive Director Collaborative Agent Design Research Center (CADRC) California Polytechnic State University (Cal Poly) San Luis Obispo, California In my introduction to this year’s conference I will address six questions that I believe come to the core of our conference theme of interoperability. Do we human beings resist change? Is it in fact a human problem and not a technical problem that we are dealing with? Can non-human intelligence exist? Do we even have a need for intelligent software? How did software, particularly intelligent software (i.e., if we accept that there is such a thing) evolve over the past several decades, and what is all this talk about a Semantic Web environment? And, finally, what does the future hold in the next five to ten years? Fig.1: “…it was the best of times…” Fig.2: “…it was the worst of times…” I would like to start by paraphrasing one of my favorite authors, Charles Dickens. Many of you will recall that in The Tale of Two Cities, he started off the entire book with a long paragraph that began with the words: "...it was the best of times, it was the worst of times..." These are words that I believe apply very much today.
    [Show full text]
  • CONSUMABILITY ANALYSIS of BATCH PROCESSING SYSTEMS FLAVIO FRATTINI Tesi Di Dottorato Di Ricerca
    UNIVERSITÀ DEGLI STUDI DI NAPOLI FEDERICO II Dottorato di Ricerca in Ingegneria Informatica ed Automatica Comunità Europea A. D. MCCXXIV Fondo Sociale Europeo CONSUMABILITY ANALYSIS OF BATCH PROCESSING SYSTEMS FLAVIO FRATTINI Tesi di Dottorato di Ricerca (XXVI Ciclo) Marzo 2014 Il Tutore Il Coordinatore del Dottorato Prof. Stefano Russo Prof. Francesco Garofalo Dipartimento di Ingegneria Elettrica e delle Tecnologie dell’Informazione + Via Claudio, 21 - 80125 Napoli - ([+39] 081 76 83813 - 4 [+39] 081 76 83816 CONSUMABILITY ANALYSIS OF BATCH PROCESSING SYSTEMS By Flavio Frattini SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY AT FEDERICO II UNIVERSITY OF NAPLES VIA CLAUDIO 21, 80125 { NAPOLI, ITALY MARCH 2014 c Copyright by Flavio Frattini, 2014 Per aspera ad astra. Abstract The use of large scale processing systems has exploded during the last decade and now they are indicated for significantly contributing to the world energy consumption and, in turn, environmental pollution. Processing systems are no more evaluated only for their performance, but also for how much they consume to perform at a certain level. Those evaluations aim at quantifying the energy efficiency conceived as the relation between a performance metric and a power consumption metric, disregarding the malfunction that commonly happens. The study of a real 500-nodes batch system shows that 9% of its power consumption is ascribable to failures compromising the execution of the jobs. Also fault tolerance techniques, commonly adopted for reducing the frequency of failure occurrences, have a cost in terms of energy consumption. This dissertation introduces the concept of consumability for processing systems, en- compassing performance, consumption and dependability aspects.
    [Show full text]
  • DB2 Administration Solution Pack for Z/OS Streamlining DB2 for Z/OS Database Administration
    IBM® Information Management Software Front cover DB2 Administration Solution Pack for z/OS Streamlining DB2 for z/OS Database Administration Understand how to simplify the database administration functions Learn to adapt your data with the new change capabilities See how to monitor database client/server configurations Paolo Bruni Tom Crocker Elaine Morelli Richard Schaufuss ibm.com/redbooks International Technical Support Organization DB2 Administration Solution Pack for z/OS: Streamlining DB2 for z/OS Database Administration August 2013 SG24-8148-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xvii. First Edition (August 2013) This edition applies to Version 1.1 of IBM DB2 Administration Solution Pack for z/OS (program number 5697-DAM). © Copyright International Business Machines Corporation 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . vii Tables . xiii Examples . .xv Notices . xvii Trademarks . xviii Preface . xix Authors . xix Now you can become a published author, too! . .xx Comments welcome. .xx Stay connected to IBM Redbooks . xxi Part 1. DB2 Tools Solution Packs . 1 Chapter 1. The DB2 Tools Solution Packs . 3 1.1 DB2 Tools Solution Packs. 4 1.2 Overview of the IBM Tools Customizer. 6 1.2.1 Installing the base for solution packs . 10 Chapter 2. The Tools Customizer . 13 2.1 Component selection . 14 2.2 Installation discovery. 15 2.3 DB2 entries and association . 16 2.4 Component customization. 19 2.5 Generation of customization jobs .
    [Show full text]
  • IBM Z14 Model ZR1 (M/T 3907) Technical Leadership Library
    IBM z14 Model ZR1 (M/T 3907) Technical Leadership Library April 10, 2018 Announcement John McLemore, z Client Architect [email protected] 214-679-8484 IBM Z (M/T 3907) TLLB1 © 2017, 2018 IBM Corporation Trademarks The following are trademarks of the International Business Machines Corporation in the United States, other countries, or both. Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market. Those trademarks followed by ® are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States. For a more complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: *BladeCenter®, CICS®, DataPower®, Db2®, e business(logo)®, ESCON, eServer, FICON®, IBM®, IBM (logo)®, IMS, MVS, OS/390®, POWER6®, POWER6+, POWER7®, Power Architecture®, PowerVM®, PureFlex, PureSystems, S/390®, ServerProven®, Sysplex Timer®, System p®, System p5, System x®, z Systems®, System z9®, System z10®, WebSphere®, X-Architecture®, z13™, z13s™, z14 ™, z14 Model ZR1™, z Systems™, z9®, z10, z/Architecture®, z/OS®, z/VM®, z/VSE®, zEnterprise®, zSeries®, IBM Z ® The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc.
    [Show full text]
  • Rome Software Development Lab Technology and Customer Value
    ® IBM Software Group RRoommee SSooffttwwaarree DDeevveellooppmmeenntt LLaabb TTeecchhnnoollooggyy aanndd ccuussttoommeerr vvaalluuee:: tthhee ppaatthh ttoo ooppeenn iinnnnoovvaattiioonn Giovanni Lanfranchi © 2008 IBM Corporation IBM Confidential IBM Software Group | Tivoli software The Rome SWG Lab at a glance London (UK) Galway, Cork (Ire) Krakow (Pol) Rome (ITA) Toronto (CAN) San Jose (CA) Raleigh (NC) Los Angeles (CA) Austin (TX) ~350 Developers ~70 Sales Enablers team s ° Developing mission critical applications ° Executive Briefing Center ° Full WW development ownership of the ° Pre and Post Sales support scheduling offering ° ° Strengthen linkages with SMB market Leader in process development ° BP enablement events methodology Dev, 350 ° SMB demo environment ° Development of customized solutions ° ENEL - Automated Meter Management ° Repubblica – NICA ° Tivoli Telecom Italia - Security ~150 SW G Services Support, ° Key linkages with the Italian market SWG 70 ~40 Tivoli Support ° Consultancy in key project at all the Services, Solutions 150 major Italian Companies Lab, 40 ° WW support for key Tivoli products ° Sogei – “Portale delle Entrate” ° Recognized as the best client facing team ° Senato – Intranet site ° Covering all SWG brands IBM Confidential 2 IBM Software Group | Tivoli software Rome SWG Lab: continuous innovation Customer Intimacy TWS 8.3 Productivity Rate Leader in 60.00 56.00 IT 1 IT 2 IT 3 IT 4 IT 5 IT 6 Beta software 52.00 48.00 development 44.00 methodologies 40.00 36.00 32.00 Operational 28.00 model based on 24.00
    [Show full text]
  • Silvio's Corner
    GSE z/OS Expertforum Switzerland # 81, 21.-22.10.2014 ® Silvio’s Corner z/News, Hints and Tips Silvio Sasso IBM Switzerland ITS Service Delivery for z/OS [email protected] Zürich, October 21, 2014 Zürich, October 21, 2014 Zürich | 26. Oktober 2004 © 2004 IBM Corporation © 2014 IBM CorporationPage 1 zEnterprise. Smarter Computing © 2014 IBM Corporation Objectives and important Disclaimer The objective of this news session is to provide you with up-to-date and last minute technical information, hints and tips related to IBM mainframe hardware and software, such as IBM System z, z/Architecture and z/OS. This corner allows me to present you... ƒ Hardware news: IBM hardware announcements, new features and options ƒ Software news: z/OS and Parallel Sysplex update ƒ Various resources containing additional documentation (e.g. product specific information or other interesting Websites etc.) ƒ System programmer goodies, tools, hints and tips ƒ Useful technical news and flashes ƒ Recommended readings: new Redbooks and whitepapers etc. ƒ Tips for education, workshops and conferences ƒ and much more... Note: the information contained in this document has not been submitted to any formal IBM test and is distributed on an "as is" basis without any warranty either expressed or implied. The use of this information or the implementation of any of the techniques or hints and tips described is a customer responsibility and depends on the customer’s ability to evaluate and integrate them into the customer’s operational environment. Customers attempting to adapt these techniques to their own environments do so at their own risk.
    [Show full text]