Deeper insight

Related resources
SPI commands that alter system configurations are now logged. Identity propagation is extended, and auditing of user IDs that make requests over IP is improved. Information about use of SSL cipher suites, with information on actual and potential use of specialty processors, can help you to tune system performance.


theme8.html | Timestamp icon Last updated: Thursday, 27 June 2019