Previous Topic: IntroductionNext Topic: Software Configuration


Hardware Configuration

The IBM z/OS operating system has features that protect the CPU storage area from unauthorized access. The following hardware configurations are permitted: