Data
Integrity
and
Verification
IBM
computer
systems
contain
mechanisms
designed
to
reduce
the
possibility
of
undetected
data
corruption
or
loss.
This
risk,
however,
cannot
be
eliminated.
Users
who
experience
unplanned
outages,
system
failures,
power
fluctuations
or
outages,
or
component
failures
must
verify
the
accuracy
of
operations
performed
and
data
saved
or
transmitted
by
the
system
at
or
near
the
time
of
the
outage
or
failure.
In
addition,
users
must
establish
procedures
to
ensure
that
there
is
independent
data
verification
before
relying
on
such
data
in
sensitive
or
critical
operations.
Users
should
periodically
check
the
IBM
support
websites
for
updated
information
and
fixes
applicable
to
the
system
and
related
software.
xiii
Summary of Contents for p 655 series
Page 1: ...pSeries 655 User s Guide SA38 0617 03 ERserver...
Page 2: ......
Page 3: ...pSeries 655 User s Guide SA38 0617 03 ERserver...
Page 10: ...viii Eserver pSeries 655 User s Guide...
Page 14: ...xii Eserver pSeries 655 User s Guide...
Page 16: ...xiv Eserver pSeries 655 User s Guide...
Page 24: ...6 Eserver pSeries 655 User s Guide...
Page 32: ...14 Eserver pSeries 655 User s Guide...
Page 36: ...18 Eserver pSeries 655 User s Guide...
Page 90: ...72 Eserver pSeries 655 User s Guide...
Page 144: ...126 Eserver pSeries 655 User s Guide...
Page 208: ...190 Eserver pSeries 655 User s Guide...
Page 214: ...196 Eserver pSeries 655 User s Guide...
Page 217: ......