34
2006 © 2006 IBM Corporation IBM System i5 8/22/2007 Steven Finnes Business Resilience Product Manager Power Systems [email protected] Business Resilience & Compliance

Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

Embed Size (px)

Citation preview

Page 1: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

2006

© 2006 IBM Corporation

IBM System i5

8/22/2007

Steven FinnesBusiness Resilience Product ManagerPower [email protected]

Business Resilience & Compliance

Page 2: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

2 © 2006 IBM Corporation

1) Increasing WW demand for 24x7 service

Globalization & consolidation2)

Growing risk awareness3)

4)

What’s Driving The HA Market ?

Compliance & protection of corporate assets5)

Business managers demanding higher service levels

Page 3: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

3 © 2006 IBM Corporation

What are System i Customers Saying?

� On average 60% of our customers are looking to improve availability

� Nearly 50% want to make significant security improvements

� Over 25% want to implement high availability clusters

Page 4: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

4 © 2006 IBM Corporation

The Move is On

Every IT Shop has already deployed a level of resiliency

LE

SMB

Tape DR HA FT

Page 5: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

5 © 2006 IBM Corporation

The Availability Challenge

ProcessesProcesses

TechnologyTechnology

OrganizationOrganization

FacilitiesFacilities

Strategy and VisionStrategy and Vision

Applicationsand DataApplicationsand Data

Bu

sin

ess

Res

ilie

nc

e

Drivers

Real Time Operations

Ubiquitous Access (Internet)

Asset Utilization

Globalization

Customer Expectations

Business Dependencies

Se

rvic

e a

nd

Su

pp

ort

Dis

cip

line

& P

roc

es

s

Org

an

iza

tion

Needs

So

lutio

n R

es

ilien

ce

Page 6: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

6 © 2006 IBM Corporation

Disaster Recovery

High Availability

Backup

Transaction Integrity

Disk Protection

Fundamentals of Business Resilience

Page 7: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

7 © 2006 IBM Corporation

Disaster Recovery

Data Center Remote Recovery Center

Solution Focus:

– Reduced risk of data loss

– Establish or strengthen a business recovery plan

– Provide separate recovery location

– Primary focus is recovery point

Page 8: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

8 © 2006 IBM Corporation

High Availability

Solution Focus:

– Near continuous application service

– Eliminate the affects of planned outages

– Minimize unplanned outages

– Primary focus is recovery time & recovery point

Page 9: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

9 © 2006 IBM Corporation

Top Five Disaster Recovery Solutions

1. Off-site tape storage

2. Logical replication

3. IBM DS8000 with Global Mirror

4. Cross Site Mirroring (XSM)

5. Business recovery services (BCRS)

Page 10: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

10 © 2006 IBM Corporation

Top High Availability Solutions

1. Logical replication

2. Switchable Storage (IASPs)

3. IBM DS8000 with IASPs & Metro Mirror

4. XSM (Cross Site Mirroring)

Page 11: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

11 © 2006 IBM Corporation

Integrated or SAN

� Widely deployed

� Very flexible

� Concurrent access

� Active-Active !

Logical Replication

� FlashCopy, Metro Mirror, Global Mirror

� Point in time copy

Basic Copy Services

Copy

Integrated or SAN

� i5/OS managed copy of IASP

� Simple Switching

� Enhancements with i5/OS V5R4

Cross Site Mirroring

Advanced Copy Services

� Switchable IASPs DS Copy Services

� Metro Mirror

� Global MirrorPPRCFlashCopy

System i Multi System Availability Techniques

Integrated or SAN

Switch IASP Cluster

IASP

� Simple availability

� Single copy of data

� Building block for other IASP solutions

Page 12: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

12 © 2006 IBM Corporation

IBM Capacity Backup (CBU) OFFERINGS

� NOT ONLY FOR DR ANYMORE !

� 525 CBU, 570 CBU, 595 CBU

� Optional Processor Activations

� Move i5/OS, EE & User Entitlements

� Exceptional Value

525 CBU

520

Page 13: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

13 © 2006 IBM Corporation

http://www-03.ibm.com/systems/i/hardware/cbu/

Page 14: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

14 © 2006 IBM Corporation

The CBU: Your Next HA System

� Get started today with DR and later expand to HA

– Start with a low-cost DR implementation expand later to HA

� In-source your disaster recovery operations

– Provides a compelling cost case for in-sourcing HA/DR

� Choose any HA technology option !

– Global Mirroring, Logical Replication, XSM, IASPs, Metro Mirroring

� Upgrade your 8xx system to a CBU

– Upgrades from the 8xx are flexible, cost effective alternatives

Page 15: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

15 © 2006 IBM Corporation

Logical Replication Solutions

570 Primary570 CBU

DR, HA, Active-Active

Page 16: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

16 © 2006 IBM Corporation

Switchable Independent ASP (IASP)

IASP

OS and other

system data

OS and other

system data

System Admin Domain

Watch This Space !!

Page 17: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

17 © 2006 IBM Corporation

Cross-Site Mirroring (XSM) with Geographic Mirroring

IASP

OS and other

system data

OS and other

system data

OS and other

system dataIASP Mirrored Copy

Synchronous Replication

Page 18: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

18 © 2006 IBM Corporation

System i & TotalStorage HA Solution

OS and other system data

OS and other

system data

DS8000 DS8000

Metro Mirror

FlashCopyIASP Copy

IASP Copy

IASP Copy

Page 19: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

19 © 2006 IBM Corporation

Objection Handling

1. It costs too much

– The CBU will change all your assumptions on cost

– Two for the price of one i5/OS entitlements !

– Optional processor activations

2. The CFO says “We’ve never had an outage!”

– Let me help you shift the risk from CIO to CFO

– Let’s focus on planned downtime first

3. Tape back is good enough for our DR strategy

– Can your business really afford data loss?

– When did you last test your recovery plan?

– How do you recover transactions from last tape backup?

Page 20: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

20 © 2006 IBM Corporation

What CBU Means To You

1)

2) Start now and stage your resiliency goals

3)

5 Reasons To CBU Now

Deploy AIX or LINUX minus the cost of i5/OS 5)

This is the best economic value for HA

Choose any resiliency solution approachXSM, Logical Replication, Metro Mirror….Change your mind anytime

4) Upgrade your current 8XX to a CBU !

Page 21: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

21 © 2006 IBM Corporation

HA/DR ISV Enhanced CBU Companion Offers

To activate hyperlinks, view in Screen Show mode

www.visionsolutions.comVision HA for CBUVision Solutions

www.maxava.com/cbuNoMax CBUMaximum Availability

www.quick-edd.com/uk/promos_ibm.htm

Quick EDD CBU Edition 2006Trader’s

Website URLCompanion OfferHA/DR ISV

Page 22: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

22 © 2006 IBM Corporation

The global regulatory and business The global regulatory and business

environment requires ongoing audit environment requires ongoing audit

capabilities.capabilities.

Security & ComplianceSecurity & Compliance

Corpora

te Polic

y

IT Polic

y

Network

Platform

(s)

HR

Financial Securit

y

&Compliance

Physical

Security

Privacy

Page 23: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

23 © 2006 IBM Corporation

The System i Security Value Proposition

� Architected for Security

� Easy To Secure

� World Class ISV Portfolio

http://www.freeimages.co.uk/

Harness the Power

http://www-03.ibm.com/systems/i/security/

Page 24: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

24 © 2006 IBM Corporation

Compliance

Define Security Policy

Protect Assets From Internal Threats

Protect Assets From External Threats

Fundamentals of IT Security

Manage Security

Page 25: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

25 © 2006 IBM Corporation

Define Security Policy

� Challenges

– Expertise

– Scope

– Complexity

� Best Practices

– Lab Services Consulting

– Security ISVs

– IGS

� Secure Perspective

– Define, Implement and Audit Seamlessly

– Major innovated breakthrough

Corpora

te Polic

y

IT Polic

y

Network

Platform

(s)

HR

Financial Securit

y

&Compliance

Physical

Security

Privacy

For more information & Flash Demo

http://www-

03.ibm.com/systems/i/security/

Page 26: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

26 © 2006 IBM Corporation

IBM Secure Perspective for System i

� Secure Perspective

– Enables you to create your policy using natural language

– Implements your system security settings

– Demonstrates compliance to your policy

– Reports on compliance defined to Secure Perspective

Page 27: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

27 © 2006 IBM Corporation

Raising the Bar With Data Centric Security

� Traditional security focuses on

• Firewalls

• Virus scanning

• Password management

• Default privileges

• Encryption

� Data Centric Security

• Is done in addition to traditional security

• Provides access control to individual objects and folders

• Secure Perspective - initial focus is data centric

Page 28: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

28 © 2006 IBM Corporation

Secure Perspective: Policy Based Centric Security

Network

System

Data

Page 29: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

29 © 2006 IBM Corporation

Protect Assets From External Threats

� Challenges

– Establish all points of entry

– Manage assets outside of the datacenter

– Audit for Compliance

– Complexity

� Best Practices

– Establish Security Policy

– Firewalls, IP Filtering

– Anti Virus

– Intrusion Detection (new in V5R4)

– VPN, SSL

– Encryption

Page 30: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

30 © 2006 IBM Corporation

System i Network Security Technologies

� i5/OS Network Security

– Integrated intrusion detection

• New with V5R4

– Native VPN/SSL Solutions

� Encryption

– Integrated Cryptography and Key management APIs

• Watch this space V6R1 !

– Viruses

– Native i5/OS is Virus Resistant

– Check Object Integrity (i5/OS Exclusive)

Page 31: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

31 © 2006 IBM Corporation

System i Security ISVs

Products would be used to set and manage the security settings of the system.For example, tools to manage system values and network attributes, users,authority attributes etc

http://www-03.ibm.com/systems/i/security/

Page 32: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

32 © 2006 IBM Corporation

System i5 and Business Resilience & Compliance

� Make outages of any kind, planned or unplanned transparent to business operations

� Safeguard data by keeping hackers and viruses out

� Promote the highest levels of security, auditing and compliance management

� Deliver proven technology, backed by world-class service and support

Page 33: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

33 © 2006 IBM Corporation

Looking for Case Studies?� VEKA, Germany, iASP with external storage

– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6R7GQ7?OpenDocument&Site=eserveriseries&cty=en_us

� Saertex, Germany - *noMax from Maximum Availability

– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6R8GKW?OpenDocument&Site=eserveriseries&cty=en_us

� QUIXTAR online retailer – Mimix from Lakeview Technology

– http://www-306.ibm.com/software/success/cssdb.nsf/CS/JKIN-6NRRC3?OpenDocument&Site=eserveriseries&cty=en_us

� TDG, supply chain UK – Vision Orion

– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6V3NF7?OpenDocument&Site=eserveriseries&cty=en_us

� Tradex, Insurance UK – Echo2 from iTera

– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6SNKL6?OpenDocument&Site=eserveriseries&cty=en_us

� Ponzio Sud, Manufacturing Italy – QuickEDD from Trader’s

– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6SNKFK?OpenDocument&Site=eserveriseries&cty=en_us

� Estes Express, Transportation US - IBM Global Mirror with System i Copy Services Toolkit

– http://www-306.ibm.com/software/success/cssdb.nsf/CS/CSDB-6WD83P?OpenDocument&Site=eserveriseries&cty=en_us

� Prolit Verlagsauslieferung GmbH, Distribution – Germany – IBM XSM

– http://www-306.ibm.com/software/success/cssdb.nsf/CS/STRD-6SFJEV?OpenDocument&Site=eserveriseries&cty=en_us

� Don’t see one to suit you? Go to http://www-306.ibm.com/software/success/cssdb.nsf/topstoriesFM?OpenForm&Site=eserveriseries

Page 34: Business Resilience & Compliance - IBM · Business Resilience & Compliance. IBM Systems and Technology Group University 2006 © 2003 IBM Corporation IBM System i5 2 © 2006 IBM Corporation

IBM Systems and Technology Group University 2006

© 2003 IBM Corporation

IBM System i5

34 © 2006 IBM Corporation

The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: AIX, AIX 5L, BladeCenter,Blue Gene, DB2, e-business logo, eServer, IBM, IBM Logo, Infoprint,IntelliStation, iSeries, pSeries, OpenPower, POWER5, POWER5+, Power Architecture, TotalStorage, Websphere, xSeries, z/OS, zSeries

The following are trademarks or registered trademarks of other companies:Java and all Java based trademarks and logos are trademarks of Sun Microsystems, Inc., in the United States and other countries or bothMicrosoft, Windows,Windows NT and the Windows logo are registered trademarks of Microsoft Corporation in the United States, other countries, or both.Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarksof Intel Corporation or its subsidiaries in the United States and other countries.UNIX is a registered trademark of The Open Group in the United States and other countries or both.Linux is a trademark of Linus Torvalds in the United States, other countries, or both.Other company, product, or service names may be trademarks or service marks of others.

NOTES:Any performance data contained in this document was determined in a controlled environment. Actual results may vary significantly and are dependent on many factors including system hardware configuration and software design and configuration. Some measurements quoted in this document may have been made on development-level systems. There is no guarantee these measurements will be the same on generally-available systems. Users of this document should verify the applicable data for their specific environment.

IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply.

Information is provided “AS IS” without warranty of any kind.

All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions.

This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area.

All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.

Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

Prices are suggested US list prices and are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or Business Partner for the most current pricing in your geography.

Any proposed use of claims in this presentation outside of the United States must be reviewed by local IBM country counsel prior to such use.

The information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.

Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. Thematerials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.

IBM makes no representation or warranty regarding third-party products or services including those designated as ServerProven, ClusterProven or BladeCenter Interoperability Program products. Support for these third-party (non-IBM) products is provided by non-IBM Manufacturers.

IBM may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not give you any license to these patents. Send license inquires, in writing, to IBM Director of Licensing, IBM Corporation, New Castle Drive, Armonk, NY 10504-1785 USA.

Trademarks