General IT Controls (GITC) Risk and Impact November 2018 Risk Advisory

Total Page:16

File Type:pdf, Size:1020Kb

General IT Controls (GITC) Risk and Impact November 2018 Risk Advisory General IT Controls (GITC) Risk and Impact November 2018 Risk Advisory General IT Controls (GITC) Table of Contents Introduction 02 IT scoping for evaluation of internal controls 04 Importance of GITC 06 Implications of GITC deficiencies 07 Stepping towards a controlled IT environment 08 Conclusive remarks 13 Impact of GITC failure on the overall ICFR framework 15 Contact 16 01 General IT Controls (GITC) Introduction The importance of information technology (IT) controls has recently caught the attention of organisations using advanced IT products and services. This thought paper has been developed for the management of companies that are required to establish framework on internal controls and to ensure its effective operation throughout the year. This document draws attention on how applications should be scoped-in for monitoring internal controls and how control gaps need to be assessed and concluded. Increasing complexity of the IT setup has resulted in a greater focus around controls in the IT environment. With mandates emanating from various regulations, internal controls have gained more momentum in India during recent years. There is a trend of automation in processes and controls by adoption of advanced IT products and services for enabling greater efficiency in operations, compliance and reporting activities. This requires an increased focus on effective operation of controls around IT assets and services. Internal Financial Controls over Financial Reporting “Internal controls” refers to those activities within a company that are placed by the management to mitigate the risks that could hinder the company from achieving its objectives. Under the Committee on Sponsoring Organizations (COSO) framework revised in May 2013, there are three types of objectives which internal controls need to meet, as depicted below: Compliance Operations Reporting 02 General IT Controls (GITC) In many cases, a control may address more than one of COSO Cube (2013) these objectives. Under the COSO framework, there are five interrelated “components” of an effective internal control system; these are derived from the way the company is managed on a day-to-day basis: Operations Reporting Compliance The company’s control environment at the top- management level with respect to controls. This includes elements such as “tone at the top,” and Contro Environment the effectiveness of the board’s audit committee in its high-level oversight of financial reporting. Risk Assessment This component is known as the Control Environment. Division Entity Risk assessment of various processes and factors Control Activities that might hinder the company from achieving its Function objectives. For example, a process that is highly Information & Communication susceptible to fraud would be considered a high- Operating Unit risk area. The way in which controls are designed and Monitorng Activities implemented within the company, so as to address identified risks. This component is known as Control Activities. Purpose of Internal Control Internal control is designed, implemented, and monitored The way in which information within the company to address identified business risks that threaten the is gathered and shared, both to people within the achievement of any of the entity’s objectives that concern company responsible for operations and financial reporting, and to external users of financial • The reliability of the entity’s financial reporting; reports. This component is known as Information • The effectiveness and efficiency of its operations; and and Communication. • Its compliance with applicable laws and regulations. The way in which the effectiveness of these controls are monitored by the company management who take corrective actions wherever necessary. 03 General IT Controls (GITC) IT scoping for evaluation of internal controls Multiple application systems, data warehouses, report writers, and layers of supporting IT infrastructure (database, operating system, and network) may be involved in the business process, right from initiation of a transaction to its recording in the general ledger. Such transactions ultimately lead to reporting in the financial statements, and therefore, any or all of these systems and IT infrastructure may be relevant to the audit. Scoping considerations for IT applications relevant to audit The management needs to maintain documentation for understanding the system landscape mapped to key business processes that are relevant to financial reporting, including: • The classes of transactions in the company's operations that are significant to the financial statements; • The procedures, within both automated and manual systems, by which those transactions are initiated, authorised, processed, recorded, and reported; • Significant account balances that are material with respect to financial reporting; • Ways in which the information system captures transaction, events and conditions that are significant to the financial statements; and • The period-end financial reporting process. The determination as to which application system, data warehouses, or report writers are relevant to the audit requires general IT controls to address their integrity and reliability. 04 General IT Controls (GITC) Data Automated Controls System-Generated Reports The management relies on The management relies upon the The management relies on an an application system or data application system to perform application, data warehouse query, warehouse to process or maintain certain automated functions that or report writer to generate a data (e.g. transactions or other are relevant to the audit. report that is used in the operation relevant data) related to significant of relevant controls. accounts or disclosures or reports used in the operation of relevant control. For Example Assume that an entity’s SAP application runs on a UNIX server (operating system) and uses an Oracle database. User authentication is dependent upon Windows Active Directory (operating system) and the entity is using Cisco network management software. In this example, the UNIX and Windows Active Directory operating systems, Oracle database, and Cisco network management software are the technology elements supporting the SAP application system, and all of these technology elements are relevant to the audit. 05 General IT Controls (GITC) Importance of GITC Sustaining reliable financial information is dependent upon effective internal control and General IT Controls (GITCs) are a key part of entities’ internal control framework. GITCs are a critical component of business operations and financial information controls. They provide the foundation for reliance on data, reports, automated controls, and other system functionality underlying business processes. The security, integrity, and reliability of financial information relies on proper access controls, change management, and operational controls. The importance and relevance of General IT Controls to key stakeholders—owners, investors, regulators, audit committees, management, and auditors— continues to increase. Effective controls The processes, While financial Regulators Cyber security Automation in operations, controls, information is expect enhanced is a broad is becoming compliance and financial not new, the reliability business risk, increasingly with laws and data relevant complexity of financial which extends important given regulations, to financial of financial information, and to financial the reliance and financial information are reporting, stakeholders information. on automated reporting are often also relied business are looking for controls such fundamental to upon by the models, and the more specific as calculations, well-managed management technology used information and access controls, entities. Entities to manage the to support them transparency. segregation of recognise the business and key continues to Entities and duties and input, importance of decision-making. evolve. auditors need to processing, and internal control address these output controls. to the reliability concerns to These automated of the business meet evolving controls rely on processes that owner, investor, GITCs to ensure they use to run and regulator they function the entity. expectations. properly. 06 General IT Controls (GITC) Implications of GITC deficiencies Deficiencies in GITCs may hinder Deficiencies in GITCs may increase of technical skill necessary to exploit the the management’s ability to prepare audit effort and cost due to additional deficiency, among other factors, could accurate financial information. If these audit procedures needed to respond to affect the severity of a deficiency. deficiencies are not identified and unaddressed IT risks. addressed in a timely manner, they As such, when considering the nature may impact the overall functioning Certain GITC deficiencies present and cause of the deficiency, it is of internal controls, thereby resulting "a greater risk" of resulting in a important to consider whether the in delayed financial closing process, misstatement that could be pervasive GITC deficiency presents a "lesser risk" impact on internal decisions and/or in nature and could have far-reaching of misstatement or a "greater risk" of public disclosure. This could ultimately implications. The proximity of the GITC misstatement. These considerations affect the reputation and brand of the deficiency to financial reporting (e.g., a are relevant to determine the nature, company. deficiency at the application layer versus
Recommended publications
  • Oracle Solaris: the Carrier-Grade Operating System Technical Brief
    An Oracle White Paper February 2011 Oracle Solaris: The Carrier-Grade Operating System Oracle White Paper—Oracle Solaris: The Carrier-Grade OS Executive Summary.............................................................................1 ® Powering Communication—The Oracle Solaris Ecosystem..............3 Integrated and Optimized Stack ......................................................5 End-to-End Security ........................................................................5 Unparalleled Performance and Scalability.......................................6 Increased Reliability ........................................................................7 Unmatched Flexibility ......................................................................7 SCOPE Alliance ..............................................................................7 Security................................................................................................8 Security Hardening and Monitoring .................................................8 Process and User Rights Management...........................................9 Network Security and Encrypted Communications .......................10 Virtualization ......................................................................................13 Oracle VM Server for SPARC .......................................................13 Oracle Solaris Zones .....................................................................14 Virtualized Networking...................................................................15
    [Show full text]
  • The Wine Industry Audit Technique Guide
    The Wine Industry Audit Technique Guide NOTE: This document is not an official pronouncement of the law or the position of the Service and cannot be used, cited, or relied upon as such. This guide is current through the publication date. Since changes may have occurred after the publication date that would affect the accuracy of this document, no guarantees are made concerning the technical accuracy after the publication date. Publication Date: March 2011 Table of Contents Introduction .............................................................................................................................................. 2 Chapter 1 - Overview of Winery/Vineyard Operations ............................................................................ 3 Farming ................................................................................................................................................. 3 Winery (Manufacturing) ....................................................................................................................... 4 Marketing/Sales .................................................................................................................................... 6 Chapter 2 - Pre-Audit Information Gathering ........................................................................................... 8 Information Sources .............................................................................................................................. 8 Chapter 3 - Audit Considerations .............................................................................................................
    [Show full text]
  • Capital/Fixed Assets Depreciation Schedule Updated: February 2021
    Kentucky Department of Education Munis Guide Capital/Fixed Assets Depreciation Schedule Updated: February 2021 Capital/Fixed Assets Depreciation Schedule Office of Education Technology: Division of School Technology Services Questions?: [email protected] 1 | P a g e Kentucky Department of Education Munis Guide Capital/Fixed Assets Depreciation Schedule Updated: February 2021 OVERVIEW The Fixed Assets Depreciation Schedule provides a listing of asset details that were depreciated for the report year as posted from the Fixed Asset module for the report year. Asset descriptions and depreciation details are included such as estimated life, number of periods taken for the year, first and last year periods of depreciation and acquisition cost; all to assist auditors in verifying the depreciation calculation and amounts. The report also includes assets that have been fully depreciated but have a balance remaining of Life-To-Date accumulated depreciation for the reported year. The asset amounts are reported as posted from the Fixed Asset history detail records generated from the Fixed Asset module and does NOT include amounts generated from General Journal Entries. The Depreciation Schedule pulls from two different Fixed Asset sources: 1. Fixed Asset Master File Maintenance 2. Fixed Asset history records The Fixed Asset Master File Maintenance or Asset Inquiry is where the actual asset master records reside; where assets are added and maintained. Key fields and amounts such as the asset Acquisition cost field, Asset Type (Governmental or Proprietary), Class and Sub-class codes are pulled from the asset master file for the Depreciation Schedule. It is vital that these key fields are accurate and tie to the fixed asset history records.
    [Show full text]
  • 14. Calculating Total Cash Flows
    Chapter 2 Lecture Problems 14. Calculating Total Cash Flows. Greene Co. shows the following information on its 2008 income statement: Sales = $138,000 Costs = $71,500 Other expenses = $4,100 Depreciation expense = $10,100 Interest expense = $7,900 Taxes = $17,760 Dividends = $5,400. In addition, you're told that the firm issued $2,500 in new equity during 2008, and redeemed $3,800 in outstanding long-term debt. a. What is the 2008 operating cash flow? b. What is the 2008 cash flow to creditors? c. What is the 2008 cash flow to stockholders? d. If net fixed assets increased by $17,400 during the year, what was the addition to NWC? a. To calculate the OCF, we first need to construct an income statement. The income statement starts with revenues and subtracts costs to arrive at EBIT. We then subtract out interest to get taxable income, and then subtract taxes to arrive at net income. Doing so, we get: Income Statement Sales $138,000 Costs 71,500 Other Expenses 4,100 Depreciation 10,100 EBIT $52,300 Interest 7,900 Taxable income $44,400 Taxes 17,760 Net income $26,640 Dividends $5,400 Addition to retained earnings 21,240 Page 1 Chapter 2 Lecture Problems Dividends paid plus addition to retained earnings must equal net income, so: Net income = Dividends + Addition to retained earnings Addition to retained earnings = $26,640 – 5,400 Addition to retained earnings = $21,240 So, the operating cash flow is: OCF = EBIT + Depreciation – Taxes OCF = $52,300 + 10,100 – 17,760 OCF = $44,640 b.
    [Show full text]
  • Introduction to Unix
    Introduction to Unix Rob Funk <[email protected]> University Technology Services Workstation Support http://wks.uts.ohio-state.edu/ University Technology Services Course Objectives • basic background in Unix structure • knowledge of getting started • directory navigation and control • file maintenance and display commands • shells • Unix features • text processing University Technology Services Course Objectives Useful commands • working with files • system resources • printing • vi editor University Technology Services In the Introduction to UNIX document 3 • shell programming • Unix command summary tables • short Unix bibliography (also see web site) We will not, however, be covering these topics in the lecture. Numbers on slides indicate page number in book. University Technology Services History of Unix 7–8 1960s multics project (MIT, GE, AT&T) 1970s AT&T Bell Labs 1970s/80s UC Berkeley 1980s DOS imitated many Unix ideas Commercial Unix fragmentation GNU Project 1990s Linux now Unix is widespread and available from many sources, both free and commercial University Technology Services Unix Systems 7–8 SunOS/Solaris Sun Microsystems Digital Unix (Tru64) Digital/Compaq HP-UX Hewlett Packard Irix SGI UNICOS Cray NetBSD, FreeBSD UC Berkeley / the Net Linux Linus Torvalds / the Net University Technology Services Unix Philosophy • Multiuser / Multitasking • Toolbox approach • Flexibility / Freedom • Conciseness • Everything is a file • File system has places, processes have life • Designed by programmers for programmers University Technology Services
    [Show full text]
  • Unix/Linux Command Reference
    Unix/Linux Command Reference .com File Commands System Info ls – directory listing date – show the current date and time ls -al – formatted listing with hidden files cal – show this month's calendar cd dir - change directory to dir uptime – show current uptime cd – change to home w – display who is online pwd – show current directory whoami – who you are logged in as mkdir dir – create a directory dir finger user – display information about user rm file – delete file uname -a – show kernel information rm -r dir – delete directory dir cat /proc/cpuinfo – cpu information rm -f file – force remove file cat /proc/meminfo – memory information rm -rf dir – force remove directory dir * man command – show the manual for command cp file1 file2 – copy file1 to file2 df – show disk usage cp -r dir1 dir2 – copy dir1 to dir2; create dir2 if it du – show directory space usage doesn't exist free – show memory and swap usage mv file1 file2 – rename or move file1 to file2 whereis app – show possible locations of app if file2 is an existing directory, moves file1 into which app – show which app will be run by default directory file2 ln -s file link – create symbolic link link to file Compression touch file – create or update file tar cf file.tar files – create a tar named cat > file – places standard input into file file.tar containing files more file – output the contents of file tar xf file.tar – extract the files from file.tar head file – output the first 10 lines of file tar czf file.tar.gz files – create a tar with tail file – output the last 10 lines
    [Show full text]
  • Lecture 1: Introduction to UNIX
    The Operating System Course Overview Getting Started Lecture 1: Introduction to UNIX CS2042 - UNIX Tools September 29, 2008 Lecture 1: UNIX Intro The Operating System Description and History Course Overview UNIX Flavors Getting Started Advantages and Disadvantages Lecture Outline 1 The Operating System Description and History UNIX Flavors Advantages and Disadvantages 2 Course Overview Class Specifics 3 Getting Started Login Information Lecture 1: UNIX Intro The Operating System Description and History Course Overview UNIX Flavors Getting Started Advantages and Disadvantages What is UNIX? One of the first widely-used operating systems Basis for many modern OSes Helped set the standard for multi-tasking, multi-user systems Strictly a teaching tool (in its original form) Lecture 1: UNIX Intro The Operating System Description and History Course Overview UNIX Flavors Getting Started Advantages and Disadvantages A Brief History of UNIX Origins The first version of UNIX was created in 1969 by a group of guys working for AT&T's Bell Labs. It was one of the first big projects written in the emerging C language. It gained popularity throughout the '70s and '80s, although non-AT&T versions eventually took the lion's share of the market. Predates Microsoft's DOS by 12 years! Lecture 1: UNIX Intro The Operating System Description and History Course Overview UNIX Flavors Getting Started Advantages and Disadvantages Lecture Outline 1 The Operating System Description and History UNIX Flavors Advantages and Disadvantages 2 Course Overview Class Specifics 3
    [Show full text]
  • Introduction to UNIX What Is UNIX? Why UNIX? Brief History of UNIX Early UNIX History UNIX Variants
    What is UNIX? A modern computer operating system Introduction to UNIX Operating system: “a program that acts as an intermediary between a user of the computer and the computer hardware” CS 2204 Software that manages your computer’s resources (files, programs, disks, network, …) Class meeting 1 e.g. Windows, MacOS Modern: features for stability, flexibility, multiple users and programs, configurability, etc. *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright 2001-2003. (C) Doug Bowman, Virginia Tech, 2001- 2 Why UNIX? Brief history of UNIX Used in many scientific and industrial settings Ken Thompson & Dennis Richie Huge number of free and well-written originally developed the earliest software programs versions of UNIX at Bell Labs for Open-source OS internal use in 1970s Internet servers and services run on UNIX Borrowed best ideas from other Oss Largely hardware-independent Meant for programmers and computer Based on standards experts Meant to run on “mini computers” (C) Doug Bowman, Virginia Tech, 2001- 3 (C) Doug Bowman, Virginia Tech, 2001- 4 Early UNIX History UNIX variants Thompson also rewrote the operating system Two main threads of development: in high level language of his own design Berkeley software distribution (BSD) which he called B. Unix System Laboratories System V Sun: SunOS, Solaris The B language lacked many features and Ritchie decided to design a successor to B GNU: Linux (many flavors) which he called C. SGI: Irix They then rewrote UNIX in the C FreeBSD programming language to aid in portability. Hewlett-Packard: HP-UX Apple: OS X (Darwin) … (C) Doug Bowman, Virginia Tech, 2001- 5 (C) Doug Bowman, Virginia Tech, 2001- 6 1 Layers in the UNIX System UNIX Structure User Interface The kernel is the core of the UNIX Library Interface Users system, controlling the system Standard Utility Programs hardware and performing various low- (shell, editors, compilers, etc.) System Interface calls User Mode level functions.
    [Show full text]
  • Enterprise Computing with Oracle® Solaris for Dummies® Published by John Wiley & Sons, Inc
    Enterprise Computing ® with Oracle Solaris by Lawrence C. Miller, CISSP These materials are the copyright of John Wiley & Sons, Inc. and any dissemination, distribution, or unauthorized use is strictly prohibited. Enterprise Computing with Oracle® Solaris For Dummies® Published by John Wiley & Sons, Inc. 111 River St. Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2013 by John Wiley & Sons, Inc., Hoboken, New Jersey No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/ go/permissions. Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. Oracle is a registered trademark of Oracle and/or its affiliates. All other trademarks are the property of their respec- tive owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETE- NESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • Capitalization and Depreciation Procedures Policy
    Capitalization and Depreciation Procedures Policy Capitalization Policies The following capitalization procedures will be applied to fixed assets as defined by the Financial Accounting and Reporting Manual for Higher Educations (FARM). 1. Land a. Capitalized at cost b. Land and structures purchased or donated together will be separated when possible and capitalized separately c. Cost of preparing the land for use will be capitalized, when material, along with the cost of the land 2. Buildings a. Capitalized if - i. $25,000.00 or more and a life expectancy of at least 10 years b. Additions and renovations will be capitalized if - i. Cost of the project is $25,000.00 or more, and ii. The renovation extends the useful life of the facility or modifies and/or upgrades a building, i.e., installation of updated fire alarms, removal of handicapped barriers, etc 3. Improvements other than buildings a. Capitalized if – i. $5,000.00 or more 1. Examples are parking lots, sidewalks, fiber optics, etc. 4. Equipment a. Capitalized if - i. Cost is $5,000 or more 1. The cost of the equipment will include the purchase price, freight cost, insurance while in shipment, installation cost, and other cost incurred to get the equipment ready for actual use ii. Acquired for use in operations and not held for resale iii. Useful life is long-term in nature - It must yield services for five years or more iv. It is not an integral part of another unit 5. Software a. Capitalized if - i. Cost is $5,000.00 or more ii. Useful life is five years or more iii.
    [Show full text]
  • Unix Portability Changes in V8.4
    UNIX PORTABILITY CHANGES IN V8.4 Rupesh Shantamurty OpenVMS Engineering 1 © Copyright 2010 Hewlett-Packard Development Company, L.P. AGENDA –Overview of Unix Portability Initiative –Semaphores –UTF-8 support –GNV Update –Q & A 2 © Copyright 2010 Hewlett-Packard Development Company, L.P. UNIX PORTABILITY - OVERVIEW 3 © Copyright 2010 Hewlett-Packard Development Company, L.P. UNIX PORTABILITY INITIATIVE OBJECTIVE GOAL BENEFIT • Ease Porting of • OpenVMS will be • Less OpenVMS applications from like any other development UNIX, LINUX “UNIX flavor” for cost and Open easy application • Enhanced Source to portability application OpenVMS • Cost of porting portfolio on from UNIX to OpenVMS, OpenVMS is including Open comparable to Source porting one applications "flavor" of UNIX • Familiar UNIX- to another style development environment 4 © Copyright 2010 Hewlett-Packard Development Company, L.P. RECENT DEVELOPMENTS & V8.4 Byte Range File Lock APIs Standard Stat Locking Structure SEMAPHORES Symbolic Links POSIX style GNV Updates pathnames statvfs/fstatvfs Pthreads Encryption UTF-8 Routines Shared Objects SUPPORT 5 © Copyright 2010 Hewlett-Packard Development Company, L.P. SEMAPHORES 6 © Copyright 2010 Hewlett-Packard Development Company, L.P. INTRODUCTION - SEMAPHORES Semaphores - Inter Process Communication mechanism for synchronization across multiple processes. –System V Semaphores –POSIX Semaphores 7 © Copyright 2010 Hewlett-Packard Development Company, L.P. NEED FOR SEMAPHORES ON OPENVMS PRE V8.4 SOLUTION IN IMPACT V8.4 • Semaphore API Implements Reduces porting implementation was Semaphore APIs time Reduces cost of not available Applications using porting • Implement emulator semaphores can be Facilitates porting solutions ported without code of other Open Source • Performance issues change applications to due to layered OpenVMS emulator solutions 8 © Copyright 2010 Hewlett-Packard Development Company, L.P.
    [Show full text]
  • Oracle Solaris 11.4 Data Sheet
    Oracle Solaris is the trusted business platform that you depend on. Oracle Solaris 11 gives you consistent compatibility, is simple to use and is Key Features Consistent. Simple. Secure. designed to always be secure. • Strongest binary compatibility guarantee in INTRODUCTION the industry Oracle Solaris is designed to deliver a consistent platform to run your enterprise applications. It is the • Simple system and trusted solution for running both modern and legacy applications on the newest system hardware while application lifecycle providing the latest innovations. Our administrative interfaces are simple to use and protect your management business from error prone mistakes that could cost you critical downtime. All our technologies have been engineered for security and compliance from day one; allowing you to protect your business with • REST-based a comprehensive defense in depth strategy that’s easy to apply. administration and deployment CONSISTENT • Efficient enterprise virtualization We’ve been designing the OS for over two decades, always making sure we’ve engineered in features to meet the latest market trends while maintaining backward compatibility. Our Application Binary • Advanced data Guarantee gives you the ability to run your newest and legacy applications on modern infrastructure. management Binary Compatibility Guarantee • Simplified analysis with Observability Tools Oracle Solaris is designed and tested to protect your investment on-premises and in the cloud. The Oracle Solaris Binary Application Guarantee reflects Oracle’s confidence in the compatibility of • Remote administration applications from one release of Oracle Solaris to the next, so you can rest assured your applications will continue to run. The Oracle Solaris Source Code Guarantee assures developers that what they • Optimized for Oracle develop for Oracle SPARC will also compile and run on x86, and vice versa.
    [Show full text]