Data Integrity and Verification
IBM computer systems contain mechanisms designed to reduce the possibility of undetected data corruption
or loss. This risk, however, cannot be eliminated. Users who experience unplanned outages, system failures,
power fluctuations or outages, or component failures must verify the accuracy of operations performed and
data saved or transmitted by the system at or near the time of the outage or failure. In addition, users must
establish procedures to ensure that there is independent data verification before relying on such data in
sensitive or critical operations. Users should periodically check the IBM support websites for updated
information and fixes applicable to the system and related software.
xiii
Summary of Contents for pSeries 615 Model 6C3
Page 1: ...pSeries 615 Model 6C3 and Model 6E3 User s Guide SA38 0629 00 ERserver ...
Page 2: ......
Page 3: ...pSeries 615 Model 6C3 and Model 6E3 User s Guide SA38 0629 00 ERserver ...
Page 14: ...xii pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 16: ...xiv pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 20: ...xviii pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 26: ...6 pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 46: ...26 pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 86: ...66 pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 110: ...90 pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 146: ...126 pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 164: ...144 pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 168: ...148 pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 172: ...152 pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 204: ...184 pSeries 610 Model 6C3 and Model 6E3 User s Guide ...
Page 207: ......