4690 OS Security Functions Including Hardware, and ACE

Total Page:16

File Type:pdf, Size:1020Kb

4690 OS Security Functions Including Hardware, and ACE Security and POS Best Practices Peter Harris – [email protected] Product Line Manager Session Overview Are you leveraging best practices to ensure the inherent security of 4690? Attend this informative session to learn what they are and how they can be applied. Agenda . 4690 OS Security Functions including Hardware, and ACE . Best Practices . 4690 OS Security Case Study Who is next… 4690 SECURITY FUNCTION 4690 OS - a track record of success in retail TGCS 4690 Embedded Linux based Operating System is the premier point-of-sale platform in the retail industry today, delivering broad functionality and remarkable reliability. Designed specifically for retail store environments ‒ Reliable, secure and flexible ‒ Thin Client . Rock solid performance ‒ Approaching 1 million installations worldwide . Smallest footprint of any proven retail operating system today . Dial-tone reliability – trusted 24 x 7 x 365 . 16 of the top 25 retailers run 4690 OS 4690 OS – Data Integrity and Security • Data Integrity – Guaranteed data writing – Mirrored file capability – Totals retention – Terminal storage retention • Security – Multilevel access authorization – Enhanced user security with V5 & V6 • OpenSSH, Secure Telnet, Secure FTP – Directory Services with V6.3 – Whitelisting and File Integrity Monitoring with V6.5 TGCS Security Bulletins . TGCS Security Workgroup Communications – Controlled Distribution to 4690 OS Entitled Customers – Currently by Marketing Flash to TGCS Sales Team and Business Partners for Customer Delivery – Future Plan via Entitled Customer Only Web Portal Toshiba 4690 OS Security and Hardware . Terminal Hardware ‒ 4690 terminals don’t require a hard disk or CD-ROM ‒ No auto-run for devices in USB ports or CD-ROM ‒ Keylocks • Keyboard • Cash Drawer • Printer - Journal Station . Operator Authorization (Application) . Controller Hardware ‒ No auto-run for devices in USB ports or CD-ROM ‒ Controller only drives your POS front end ‒ Remote access: use Secure Shell (SSH) or Netop ‒ Console ID Security & FTP Lockout ‒ SSDs Toshiba 4690 OS Security . 4690 OS Architecture – Controls on File Management – Media-less terminals – Special Image Build Tools – Software Distribution Methods – Embedded Linux Layer is locked down . Windows Programs will not execute on 4690 OS – Modern Win net protocols typically do not work with 4690 OS . Limited pool of deep 4690 OS skills available in the marketplace WW – Hackers will have to acquire 4690 skills – Product Documentation removed from external website Security Functions in the 4690 Operating System Enhanced Security Secure Delete Directory Services / Open LDAP Encrypt Tool SSH / SFTP MBrowser Console ID Lockout / FTP ID Lockout Enhanced Menu Netop SSD Support Data Security for Payment Cards FIM Command Line Logging White Listing / Audit / Block SSL Certifications 4690 OS – Security . 4690 OS – No user access to 4690 Linux core – It’s not a general purpose OS – Multilevel access authorization – Whitelisting with V6.5 . Enhanced Security – Supports various password rules . Directory Services / Open LDAP – Enterprise management of IDs and passwords 4690 OS – Whitelisting . File Integrity Monitor (FIM) – Customer creates base line of “golden” system – Customer periodically runs scans of store controllers, pulling results and comparing with previous scans for unexpected file changes . Whitelisting – Customer creates authorized program list using “offline scan” tool – Each file included on the Whitelist has a signature – Each open request verifies signature if the file is on the Whitelist and if signature matches • Report Exception Mode: Provides trace logging and system events for file status, but allows all opens to proceed • Protect Mode: Prevents execution of all files that do not match the signature. Files can be defined to always be blocked. BEST PRACTICES 4690 OS Security with ACE Cash Register/POS Security Action 4690/ACE Solution Capabilities Install Payment Application Security Standard- TGCS payment application are designed to the compliant payment applications. PA-DSS standard and reviewed by an independent assessor. The PCI website has the current list of validated applications. You will find ACE V7R3, V7R4, and V7R5 in the list of validated payment applications. https://www.pcisecuritystandards.org/ Deploy the latest version of an operating system • Toshiba monitors and incorporates latest Linux and ensure it is up to-date with security patches, security patches in 4690 Enhanced anti-virus software, file integrity monitoring, and • Toshiba monitors 4690 Classic issues for security a host -based intrusion-detection system. concerns • See below for File Integrity Monitoring (FIM) response Assign a strong password to security solutions to 4690 provides password hashing (SHA1) with an prevent application modification. update in 0F10 Perform a binary or checksum comparison to 4690 has a built-in Report Module facility that can ensure unauthorized files are not installed. be used as the first line of defense in terms of file integrity management. 4690 OS/ACE Security Best Practices Cash Register/POS Security Action 4690/ACE Solution Capabilities Ensure any automatic updates from third parties 4690 does not perform automatic updates for are validated. third party software Disable unnecessary ports and services, null • By default, ports and services are disabled, and sessions, default users and guests. have to be turned on by the administrator • 4690 does not support null sessions • Administrator responsibility to change default user/password Enable logging of events and make sure there is 4690 has extensive logging capabilities and a process to monitor logs on a daily basis. coupled with the RMA Data Capture software, logs can be automatically pulled back to a central location for further analysis Implement least privileges and ACLs on users • 4690 Enhanced applications do not have root and applications on the system privileges • 4690 provides fine-grained access control to OS menu options • Our applications provides additional per-user access control to actions Implement hardware-based point-to-point • ACE V7R4 and higher provides support for encryption TransArmor Verifone Edition (TAVE) Security / Compliance with Verifone and First Data . End-to-End Encryption – Verishield Protect – Encrypts data at swipe of card . Tokenization - Transarmor (list of TAVE) – Protects card data and prevents it from entering the merchant environment – POS never holds actual card numbers from the transactions – Removing payment card data from POS removes it from PCI scope • Can reduce the scope of annual PCI audits by as much as 80% • Can reduce the time PCI compliance requires by as much as 50% ACE supports First Data’s tokenization function for credit, debit, and EBT Food/Cash tenders Best Practices .Latest software (install security patches) .Limit/avoid shared passwords .Define network zones .Use multi-factor authentication .Define, set & adhere to permissions/access .Use the functions provided .Find the right partners .BE VIGILANT! 4690 OS SECURITY CASE STUDY 4690 OS Security Case Study A 4690 OS customer hired a “white hat hacking” company to perform a penetration test of their live system. They agreed to allow us to present the results, given that no identifying information be included. 4690 OS Penetration Test Results 1.Issue Title: Insecure Protocols Severity: Severe Description: telnet ftp enabled Vendor/TGCS recommendations: Enable SSH 2.Issue Title: Sensitive Information in Memory Dumps Severity: High Description: Card data in memory dumps Vendor/TGCS recommendations: Enable “Data Security” (V6R4) 4690 OS Penetration Test Results 3.Issue Title: Insufficient Server Hardening Severity: Severe Description: Unneeded services and ports available Vendor/TGCS recommendations: Create a standard configuration enabling only appropriate ports, services, etc., 4.Issue Title: Insecure Password Policy Severity: Severe Description: No password rules enable. Vendor/TGCS recommendations: Enable “Enhanced Security” with appropriate password rules 4690 OS Penetration Test Results 5.Issue Title: Account Enumeration Severity: Medium Description: There are unique error messages for invalid ID and PW Vendor/TGCS recommendations: •SSH does provide single error message for invalid ID or PW •Control access to physical console: •Enable “Console ID lockout” to limit attempts 4690 OS Penetration Test Results 6.Issue Title: Predictable User Names Severity: Medium Description: IDs are too simple and easy to guess Vendor/TGCS recommendations: Implement a user procedure to create non-trivial IDs Case Study Conclusion The findings were addressed in V6R4 or earlier It is important to keep current with 4690 OS releases as security continues to evolve. Please share with us feedback from security studies you have initiated. Toshiba is prepared and ready to help you impalement 4690 Security Best Practices. .
Recommended publications
  • IBM Infowindow II 3153 Marketing Reference Guide
    IBM InfoWindow II 3153 G520-9415-02 Marketing Reference Guide IBM InfoWindow II 3153 G520-9415-02 IBML Marketing Reference Guide Third Edition (United States Version), July 1998 The following paragraph does not apply to the United Kingdom or any country were such provisions are incon- sistent with local law: International Business Machines Corporation provides this publication "as is" without war- ranty of any kind either expressed or implied, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the products(s) and/or programs(s) described in this publication at any time. IBM reserves the right to alter specifications and other product information without prior notice. This publication was produced for products and services offered in the United States. IBM may not offer the pro- ducts, services, or features discussed in this document in other countries, and information is subject to change without notice. Consult your local IBM Representative for information on the products, services and features available in your area. Purpose: This guide provides: • 3153 Features/Functions Information • 3153 Ordering Information • 3153 Limited Warranty/Service Information • 3153 Technical Specifications Information • RS/6000, AS/400, and 4690 Point-Of-Sale System Attachment Information This guide is intended for IBM Representatives, IBM Business Partners, and IBM customers located in the United States as a reference document.
    [Show full text]
  • Spectrum24 CB1000 for IBM 4690 Terminals User Guide Iii
    Spectrum24 CB1000 for IBM 4690 Terminals User Guide 72E-66778-01 Revision A December 2003 www.symbol.com Copyright Copyright © 2003 by Symbol Technologies, Inc. All rights reserved. No part of this publication can be modified or adapted in any way, for any purposes without permission in writing from Symbol. The material in this manual is subject to change without notice. Symbol reserves the right to make changes to any product to improve reliability, function, or design. No license is granted, either expressly or by implication, estoppel, or otherwise under any Symbol Technologies, Inc., intellectual property rights. An implied license only exists for equipment, circuits, and subsystems contained in Symbol products. Symbol, the Symbol logo and Spectrum24 are registered trademarks of Symbol Technologies, Inc. Other product names mentioned in this manual can be trademarks or registered trademarks of their respective companies and are hereby acknowledged. IBM is a registered trademark of International Business Machine Corporation. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Novell and LAN Workplace are registered trademarks of Novell Inc. Toshiba is a trademark of Toshiba Corporation. Patents This product is covered by one or more of the following U.S. and foreign Patents: 4,593,186; 4,603,262; 4,607,156; 4,652,750; 4,673,805; 4,736,095; 4,758,717; 4,760,248; 4,806,742; 4,816,660; 4,845,350; 4,896,026; 4,897,532; 4,923,281; 4,933,538; 4,992,717; 5,015,833; 5,017,765; 5,021,641; 5,029,183; 5,047,617;
    [Show full text]
  • Toshiba Surepos ACE Independent Grocer Package Transforming the Point of Sale to a Point of Service Starts Here
    Solution Brief Toshiba SurePOS ACE Independent Grocer Package Transforming the point of sale to a point of service starts here Independent Grocers face an increasingly competitive marketplace. They have to compete with large grocery chains, regional chains and supercenters with name recognition, mass buying power, advertising assistance, extensive loyalty programs and the most current point-of-sale technology. Toshiba knows independent grocers need the same powerful technology and functionality at the POS in order to compete. They need the tools to provide a fast checkout experience, better cashier productivity and expanded services to shoppers. That’s why Toshiba has developed a reliable, affordable POS solution specifically for independent grocers. An Independent Grocer is defined as an enterprise of 100 stores or less, whose primary source of salable goods is grocery wholesalers. Highlights The complete POS solution Toshiba Global Commerce Solutions offers the Toshiba SurePOS ACE Objective (Application Client Server Environment) Independent Grocer Package (AIG) – Deliver a compelling experience and services supported by Toshiba’s highly skilled Business Partners who are dedicated to to customers with innovative store solutions providing a high level of service to the independent grocer. The AIG package Solution gives retailers the tools to build a customer-centric store experience that can – The Toshiba SurePOS™ ACE Independent build deeper, more profitable relationships and help increase revenue. Plus, it is Grocer Package creates a flexible, future-ready technology platform that integrates new store Benefits solutions with ease, low risk and fast time to value. – Elevates store operations to a higher level of service with a POS solution complete The SurePOS ACE Independent Grocer with technical support, packaged at an Package includes: affordable price The AIG Package is offered in a Basic version, with keyboard, and a Premium version, with touch display.
    [Show full text]
  • IBM 4690 Operating System V6.2 Supports New Surepos 700 Models and Features
    IBM Latin America Software Announcement LP10-0017, dated January 5, 2010 Preview: IBM 4690 Operating System V6.2 supports new SurePOS 700 models and features Table of contents 1 Overview 2 Description 1 Key prerequisites 2 Product number 1 Planned availability date At a glance IBM plans a new release of the 4690 Operating System. Version 6.2 is designed to add support for the latest features of IBM® SurePOSTM 700 Models 784 and C84. IBM 4690 OS V6.2 will support the following: • Enhanced Terminal Mode • Deep sleep function • Remote conversion utility Overview The IBM 4690 Operating System V6.2 is a retail-hardened, multiuser, multitasking high-performance operating system designed to deliver unparalleled versatility, functionality, and reliability. IBM plans this new release of the operating system to add support to 4690 OS for the latest IBM SurePOS 700 Models 784 and C84. Additionally, Version 6.2 builds on new features that have been integrated into recent models of the SurePOS 700 point-of-sale system. Some of the new features that the IBM V6.2 OS is being designed to support include: • Enhanced Terminal Mode • Deep sleep function • Remote conversion utility Key prerequisites Minimum memory requirements for 4690 OS V6.2 terminals running enhanced mode will be higher than terminals running classic mode. Details will be available in the product announcement letter. Planned availability date Second quarter, 2010. Previews provide insight into IBM plans and direction. Availability, prices, ordering information, and terms and conditions will be provided when the product is announced. The information being released represents IBM's current intent, is subject to change or withdrawal, and represents only goals and objectives.
    [Show full text]
  • IBM Store Integrator V2 Adds Enhanced Functionality That Helps Improve Integration Between IBM POS Applications and Consumer Touch Points
    IBM United States Announcement 207-096, dated May 8, 2007 IBM Store Integrator V2 adds enhanced functionality that helps improve integration between IBM POS applications and consumer touch points Key prerequisites .......................................2 At a glance Description .................................................2 Product positioning .................................... 4 The following new function is being announced with IBM Store Reference information ............................... 4 Integrator V2 and works with Supermarket Application (SA), General Availability of national languages ...............4 Sales Application (GSA), and IBM Application Client/Server Education support ......................................4 Environment (ACE): Offering Information ...................................5 • Adds Secured Socket Layer (SSL) Encryption Publications ............................................... 5 Technical information .................................5 The following new functions are being announced with IBM Store Integrator V2 and work with IBM Application Client/Server Environment Software Services ......................................7 (ACE): Ordering information ..................................8 Adds 4690 Controller Failover for virtual sessions Terms and conditions ................................ 9 • Prices .......................................................11 • Adds an XML interface • Enhances Fuel Integration support Overview Store Integrator V2 is a key component of the IBM Store Integration Framework.
    [Show full text]
  • Tivoli Point-Of-Sale Manager User's Guide
    Tivoli Point-of-Sale Manager User’s Guide Ve r s i o n 2 .0 Tivoli Point-of-Sale Manager User’s Guide Ve r s i o n 2 .0 Tivoli Point-of-Sale Manager User’s Guide Copyright Notice: Copyright © 1999, 2000 by Tivoli Systems Inc., an IBM Company, including this documentation and all software. All rights reserved. May only be used pursuant to a Tivoli Systems Software License Agreement or Addendum for Tivoli Products to IBM Customer or License Agreement. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without prior written permission of Tivoli Systems. Tivoli Systems grants you limited permission to make hardcopy or other reproductions of any machine-readable documentation for your own use, provided that each such reproduction shall carry the Tivoli Systems copyright notice. No other rights under copyright are granted without prior written permission of Tivoli Systems. The document is not intended for production and is furnished “as is” without warranty of any kind. All warranties on this document are hereby disclaimed including the warranties of merchantability and fitness for a particular purpose. Note to U.S. Government Users-Documentation related to restricted rights-Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corporation. Trademarks The following product names are trademarks of Tivoli Systems or IBM Corporation: AIX, IBM, Tivoli, and TME. In Denmark, Tivoli is a trademark licensed from Kjøbenhavns Sommer - Tivoli A/S.
    [Show full text]
  • ISA Bus Store Loop Adapter P/N 01L1154 and 6347798
    Retail Store Solutions Adapters IBM Installation and Service GA27-4009-02 Note Before using this information and the product it supports, be sure to read “Safety Information” on page 27 and the general information under “Appendix. Notices” on page 23. Translations of the safety notices can be found in IBM Safety Information--Read This First, GA27-4004. Third Edition (December 1998) Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. You can also order IBM publications through your IBM representative or the IBM branch office serving your locality. Requests for copies of this publication and for technical information about IBM products should be made to your IBM Marketing Representative. A form for reader’s comments is available on the Internet at: http://www.ibm.com/solutions/retail/ Select the following links to view the form: Support Button Publications Button Tell us what you think Document Survey Link A form for reader’s comments is also provided at the back of this publication. If the form has been removed, address your comments to: IBM Corporation, Information Development, Department CJMA PO Box 12195 Research Triangle Park, North Carolina, 27709 USA When you send information to IBM, you grant IBM a nonexclusive right to use or distribute whatever information you supply in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1998. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
    [Show full text]
  • New Surepos 700 Front Service Cover Features Offer Secure, Reliable Front Access to the System Unit
    Hardware Announcement January 10, 2006 New SurePOS 700 Front Service Cover features offer secure, reliable front access to the system unit Overview Key prerequisites At a glance The IBM SurePOS 700 Series, the Front service covers: premier point-of-sale (POS) solution Front service cover set options in the IBM portfolio now offers • Must have Model 722, 742, C42, several new features designed to E42, or 782 Directly access system unit from enable fast, easy service. the front without removing rear Cable arm: Ultimately, these features help cables. Quickly remove or replace internal drives (when used with reduce your retail customers′ • Must have front service cover service costs, which helps minimize media door). • Must order medium or long length total cost of ownership. Plus, these Cable arm option features do not compromise system I/O cables security. Access rear cabling from the front PCI NVRAM adapter: without moving the system unit All models of the IBM SurePOS 700 • If using this adapter with 4690 OS, (when used with front service Series now feature a simple, cover). two-screw media door for convenient must have V3R3, or higher access to internal drives. This • Must have IBM PCI NVRAM adapter feature comes standard and allows xSeries listed in 4690 controller service technicians direct access to matrix This replaces the existing PCI the internal hard drive, as well as the NVRAM adapter and offers the CD-ROM or DVD drive. Product number same 128K of NVRAM. This adapter is available for xSeries All models also offer optional covers For details, refer to the Product units used as controllers in a 4690 that enable front-side access to the number section in this OS environment.
    [Show full text]
  • Identification of Factors That Aid Carbon Sequestration in Illinois Agricultural Systems
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Illinois Digital Environment for Access to Learning and Scholarship Repository Contract Report 2003-02 Identification of Factors that Aid Carbon Sequestration in Illinois Agricultural Systems by Edward C. Krug and Steven E. Hollinger Prepared for the Illinois Council on Food and Agricultural Research (C-FAR) March 2003 Illinois State Water Survey Atmospheric Environment Section Office of the Chief Champaign, Illinois A Division of the Illinois Department of Natural Resources Identification of Factors that Aid Carbon Sequestration in Illinois Agricultural Systems Edward C. Krug and Steven E. Hollinger FINAL REPORT to Illinois Council on Food and Agricultural Research (C-FAR) on Contract IDACF 02E 14 5 WS Steven E. Hollinger Principal Investigator Illinois State Water Survey 2204 Griffith Drive Champaign, Illinois 61820-7495 March 2003 Identification of Factors that Aid Carbon Sequestration in Illinois Agricultural Systems Executive Summary Soil organic carbon (SOC) sequestration is important to climate change and cropland agriculture. Crops naturally use the greenhouse gas, carbon dioxide (CO2), from the atmosphere; the greater the crop productivity the greater the amount of CO2 used. Agronomic practices that enhance sequestration of crop biomass in soil as SOC also enhance removal of CO2 from the atmosphere, and improve and sustain soil fertility. To effectively reduce the concentration of CO2 in the atmosphere and mitigate climate change, sequestration of SOC must be long term, defined as decades or longer. This report presents a review and synthesis of scientific understanding of SOC sequestration, based on the history and genesis of soils and vegetation in Illinois, and the response of SOC and crops to agronomic practices.
    [Show full text]
  • A Holistic Analysis of IBM's "On Demand" Strategy
    Table of Contents Page 1 Table of Contents Table of Contents............................................................................................... 1 1 Introduction .................................................................................................... 3 1.1 Questions Discussed in this Master Thesis ............................................. 4 1.2 Areas Not within the Scope of this Master Thesis ................................... 6 1.3 Structure of this Master Thesis................................................................ 7 2 IBM’s “e-business on demand” and the “New Era” ........................................ 8 2.1 Evolution of “e-business on demand” ...................................................... 9 2.1.1 IBM System/360............................................................................ 9 2.1.2 IBM Personal Computer.............................................................. 11 2.1.3 IBM Midrange Systems: AS/400 & RS/6000............................... 13 2.1.4 SAA - Systems Application Architecture ..................................... 16 2.1.5 Change of Commercial Model..................................................... 18 2.1.6 Building on Services.................................................................... 21 2.1.7 e-business................................................................................... 24 2.1.8 Focusing on Middleware ............................................................. 26 2.1.9 Java ...........................................................................................
    [Show full text]
  • IBM Surepos 4694
    The fast, intelligent POS solution for a dynamic retail world IBM SurePOS 4694 available. It accommodates traditional cathode ray tube (CRT) or digital monitors. Its open platform can run applications for Microsoft® Windows®, IBM 4690 operating system (OS), Red Hat Linux 7.1 and DOS, so you can keep proven POS software in place. The operating system is sold separately. Flexible configurations Model 347 shown configured with optional The SurePOS 4694 lets you choose components: IBM SureMark printer, IBM SurePoint Solution, 40-character LCD from a long list of keyboards, displays, and ANPOS Web-enabled keyboard with cash drawers and printers. System pointing device. units with wide or narrow footprints are available, as are integrated and The reliable choice for high- distributed configurations. Expansion Highlights performance retailing options include optional hard drives, With more than one million units placed memory upgrades and ISA/PCI Includes multiport connectivity worldwide, the IBM SurePOS™ 4694 architecture. This variety of configura- and broad operating system point-of-sale (POS) system delivers the tion options helps you tailor the right support to help protect your proven performance retailers need to POS solution for virtually any store. existing investments help keep stores running smoothly and protect profitability. The SurePOS 4694 Provides a wide range of Broad software offering has the processing power to handle peripherals and expansion These retail-hardened systems support the latest POS applications, including options
    [Show full text]
  • 4693, 4694, 4695 POS Terminals: Hardware Service Manual
    IBM 4693, 4694, and 4695 Point-of-Sale Terminals: SY27-0337-02 Hardware Service Manual Note Before using this information and the products it supports, be sure to read the general information under “Notices” on page viii. Translations of the safety notices can be found in IBM 4693/4694 Point of Sale Terminals: Product Safety Information, P/N 60G1330. Third Edition (October, 1995) This is the third edition of the IBM 4693, 4694, 4695 Point-of-Sale Terminals: Hardware Service Manual. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. A form for readers’ comments is provided at the back of this publication. If the form has been removed, address your comments to: IBM Corporation, Information Development, Department CJMA P.O. Box 12195 Research Triangle Park, North Carolina 27709 USA When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1993, 1995. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Notices . viii Trademarks . viii Electronic Emission Notices .......................................... ix General Safety Considerations ........................................ ix Electrostatic Discharge (ESD) .......................................... x European Union (EU) Electromagnetic Compatibility ............................ xi Laser Product Identification .......................................... xi Preface . xii Store System Library ................................................ xii Store System Related Publications — Software ................................ xiii Store System Related Publications — Hardware ................................ xiii General Publications .
    [Show full text]