Data Integrity and Verification
IBM computer systems contain mechanisms designed to reduce the possibility of
undetected data corruption or loss. This risk, however, cannot be eliminated. Users who
experience unplanned outages, system failures, power fluctuations or outages, or
component failures must verify the accuracy of operations performed and data saved or
transmitted by the system at or near the time of the outage or failure. In addition, users
must establish procedures to ensure that there is independent data verification before
relying on such data in sensitive or critical operations. Users should periodically check
the IBM support websites for updated information and fixes applicable to the system and
related software.
xv
Summary of Contents for RS/6000 44P Series 270
Page 1: ...RS 6000 44P Series Model 270 Service Guide SA38 0572 02 ...
Page 10: ...x Service Guide ...
Page 14: ...xiv Service Guide ...
Page 16: ...xvi Service Guide ...
Page 20: ...Rear View 1 2 3 4 5 6 7 8 9 11 12 13 14 15 16 10 17 18 19 2 Service Guide ...
Page 44: ...26 Service Guide ...
Page 164: ...146 Service Guide ...
Page 204: ...186 Service Guide ...
Page 247: ...b Slide the covers to the rear and remove Chapter 9 Removal and Replacement Procedures 229 ...
Page 288: ...270 Service Guide ...
Page 290: ...1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 21 20 22 23 24 25 272 Service Guide ...
Page 294: ...Keyboards and Mouse 276 Service Guide ...
Page 296: ...Keyboards and Mouse Black 278 Service Guide ...
Page 298: ...Power Cables 1 2 3 4 5 6 7 8 9 10 11 280 Service Guide ...
Page 300: ...282 Service Guide ...
Page 302: ...284 Service Guide ...
Page 304: ...286 Service Guide ...
Page 310: ...292 Service Guide ...
Page 338: ...320 Service Guide ...
Page 345: ......
Page 346: ... Printed in U S A September 2001 SA38 0572 02 ...