This document discusses managing SSL in Rocket MV products. It covers SSL vulnerabilities like Heartbleed and POODLE. It discusses industry trends moving away from SHA1 and disabling SSLv3. It outlines how UniData, UniVerse, and U2 clients support SSL, including managing certificates and security context records. It provides configuration options to strengthen SSL security.
This presentation is meant to cover the basis of what streaming media is. There is a definition given, a history, and how streaming media is used today, along with a video example.
a college seminar power point presentation on upcoming gaming technologies
p.s: the fonts i used were different then its shown plz install the font "Shopping Script", "Cheveuxdange", "lato light", and "mv boli"
This powerpoint shows how violence/sexual contents in video games will affect teenager. Since teenagers are less mature than adult and have less experience, teenagers are most likely become victims of violence/sexual video games and may carry out crime.
This presentation is meant to cover the basis of what streaming media is. There is a definition given, a history, and how streaming media is used today, along with a video example.
a college seminar power point presentation on upcoming gaming technologies
p.s: the fonts i used were different then its shown plz install the font "Shopping Script", "Cheveuxdange", "lato light", and "mv boli"
This powerpoint shows how violence/sexual contents in video games will affect teenager. Since teenagers are less mature than adult and have less experience, teenagers are most likely become victims of violence/sexual video games and may carry out crime.
In this session you'll learn how to configure your D3 environment to take advantage of D3/Unix Hot Backup for data protection and process off-loading from your primary server for the Unix platforms. The training includes preparing and maintaining your system for Hot Backup - including setup, optimization and performance, monitoring, and making your application Hot Backup friendly.
Implementing Continuous Integration to Improve Software QualityRocket Software
Continuous Integration (CI) can dramatically improve the effectiveness of the software development process, which in turn can lead to improved product quality. This session provides a case study of the CI implementation for U2 databases and tools. We will cover just what is CI, examine the challenges faced, explore the business value of CI and how it can improve quality, and view a demonstration of CI projects.
In this session you'll learn how to configure your D3 environment to take advantage of D3/Unix Hot Backup for data protection and process off-loading from your primary server for the Unix platforms. The training includes preparing and maintaining your system for Hot Backup - including setup, optimization and performance, monitoring, and making your application Hot Backup friendly.
Implementing Continuous Integration to Improve Software QualityRocket Software
Continuous Integration (CI) can dramatically improve the effectiveness of the software development process, which in turn can lead to improved product quality. This session provides a case study of the CI implementation for U2 databases and tools. We will cover just what is CI, examine the challenges faced, explore the business value of CI and how it can improve quality, and view a demonstration of CI projects.
The SB Support Application is a new SB application that will be provided as part of the standard installation from version 6.4.0 of SB+ and SB/XA.
In this presentation, we will review the features of this application and discuss how they can be used to improve the support of your SB applications.
You can load-level usage across multiple servers by using a U2 Replication subscribing server to perform EDA extracts into another database on another operating system (like a Windows SQL Server). Come see how!
Introduction to GitHub and why it has taken the open-source community by storm. Examples of community-driven software projects in GitHub and an introduction to the Rocket MultiValue Lab’s GitHub repository and what you can find there. An introduction to the Git software versioning system and how it is integrated with GitHub.
If you are trying to connect to D3 to consume Web Services, you need to attend this session! It covers all aspects of the D3 Toolkit. You will learn the components and how to create MV Web Servers and MVSP Servers as well as SOAP or REST BASED services.
Node.js is a powerful JavaScript platform that helps you build server applications. It has become a popular option for building network applications and web servers. Explore how Node.js interacts with the multitude of add-on open source modules to build a modern web application in no time.
U2 Replication should be used as a strategic foundation for HADR. Come see a demonstration of U2 Replication in Action and how to failover to another server. Various architectures will be discussed including virtualization.
U2 Database Audit Logging is a security feature that allows the capture of any event that occurs in the database. This session introduces Audit and details the architecture and components. It also includes some recommendations for best practices.
This session will take you through the File Types available for use with UniVerse. The UniVerse File Header structure will be examined. A more detailed review of UniVerse dynamic hashed, static hashed, and btree file header structures is included. And finally a review of the group and record structures associated with dynamic and static hashed files.
8.1 In Depth: New 64-bit Files and File ManagementRocket Software
8.1 was the first major release of UniData in several years, so find out about all the new features and functionality we’ve added. New features include 64-bit files, 64-bit builds, account-based licensing, installation improvements, improvement to ADE, IPV6 support … and the list goes on.
The Cloud offers great opportunity for disruption in the business world by offering ways to create, test, and deploy applications with greater reach and more simplicity than ever before. Come learn about the Cloud and how Rocket MV is helping you get SaaS-y with capabilities such as Account Based Licensing, RESTful APIs, and micro-services.
Provide training on how to troubleshoot Rocket® D3 DBMS on both Windows and UNIX platforms. Focusing on utilities and commands utilized to troubleshoot D3 in areas of performance, license management, overflow management, process locking, D3 server failures and error reporting and management.
In this session you'll learn how to configure your D3 environment to take advantage of D3 FSI Hot Backup for data protection and process off-loading from your primary server for the Windows platform. The training includes preparing and maintaining your system for Hot Backup - including setup, optimization and performance, monitoring, and making your application Hot Backup friendly.
8.1 was the first major release of UniData in several years. This presentation describes the new features and functionality we’ve added. New features include 64-bit files, 64-bit builds, account-based licensing, installation improvements, improvement to ADE, IPV6 support … and the list goes on.
Automatic Data Encryption (ADE) is a security tool available for UniData and UniVerse. This session will concentrate on more real world topics rather than ‘how to’ . The intent is to provide the knowledge required for creating a strategy for your application and customers.
This session focuses on Business Intelligence Best Practices with an emphasis on dashboard design and performance techniques. Learn about the different types of users and consumers of BI and how they impact your development strategy.
Driving a PHP Application with MultiValue DataRocket Software
This session’s focus is to provide insight on how to leverage the popular server side language of PHP to interface with your U2 or D3 MultiValued database. Learn how to call and consume Web Services content in an easy to learn web development language.
Decrypting and Selectively Inspecting Modern TrafficShain Singh
Some Security equipment vendors claim that modern Perfect Forward Secrecy (PFS)-encrypted traffic cannot be decrypted inline. Alternative techniques must be used to locate malware hiding in such encrypted traffic, such as using Artificial Intelligence to guess if a security threat is present.
Please join the CASC for a Hangout covering that State of the Web. Topics covered :
The move to 2048-bit certificates
The move to ShA2
TLS 1.2
EV certificates
Revocation checking
Always on SSL
PFS
New gTLDs
Members from Comodo, DigiCert, Entrust, and GoDaddy.
Robin Alden- Comodo
Jeremy Rowley- DigiCert
Bruce Morton- Entrust
Wayne Thayer- Go Daddy
Rick Andrews- Symantec
Enterprise Node - Securing Your EnvironmentKurtis Kemple
Just like any other language, Node is susceptible to vulnerabilities, dependency issues, and other problems that can bring down or prevent you from releasing new versions of your application.
Learn how to safe-guard your environment with things like private registries and vulnerability testing during your CI build in this one-hour lightning talk.
=================================
TOPICS COVERED:
Why is Securing Your Environment Important
• Protects Your Company from Potential Threats
• Improves Confidence in Code and Systems
• Helps You Meet Legal and Organization Restrictions
Securing Your Runtime
• N|Solid - Enterprise Runtime
• Containerization
• Monitoring
Securing Your Dependencies
• Whitelisting Modules
• NSP
Securing Your Applications
• HTTPS ALL THE THINGS
• Encrypt Sensitive Data
=================================
Here Be Dragons: Security Maps of the Container New WorldC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/1KjxPiO.
Josh Bregman explores some of the unique security challenges created by both the development workflow and application runtime, explains why and how the current approaches in SecDevOps 1.0 are insufficient, and how SecDevOps 2.0 techniques including Software Defined Firewalls (SDF) provide a promising path forward for all parties involved. Filmed at qconnewyork.com.
Josh Bregman is Information Security Architect and Executive Vice President for Technical Sales at Conjur Inc.
Getting Safe Swiss Cloud up and running with CloudStackProdosh Banerjee
In this presentation we share our experience of getting Safe Swiss Cloud up and running with CloudStack. It includes a basic introduction to the CloudStack architecture.
SQLSaturday je jednodňová konferencia určená pre SQL Server profesionálov a aj pre tých, ktorí sa chcú dozvedieť niečo o SQL Servri. Na konferencii budú prednášať domáci aj zahraniční prednášatelia a vďaka našim sponzorom je vstup na konferenciu voľný. Podmienkou je len registrácia. Konferencia sa uskutoční dňa 20. júna 2015 v priestoroch spoločnosti Microsoft Slovakia, Apollo Business Center II, Prievozská 4D, 821 09 Bratislava.
Introduction to the new MediaTek LinkIt™ Development Platform for RTOSMediaTek Labs
The new MediaTek LinkIt™ Development Platform for RTOS is based on ARM Cortex-M4 MCU architecture and provides leading features for the creation of connected appliances, home and office automation devices, smart gadgets, and IoT bridges. Supporting a range of chipsets (initially the MediaTek MT7687F), LinkIt for RTOS offers the convenience of a single toolset and common API implemented over a popular RTOS. With this you can achieve economies across a full range of consumer and business IoT devices. The platform consists of a Software Development Kit (SDK), Hardware Development Kits (HDKs), including modules from supply chain partners, and related technical documentation. The first release of the platform supports the MediaTek MT7687F Wi-Fi SOC which has a 192 MHz MCU, 1×1 802.11b/g/n Wi-Fi subsystem, integrated security engine (AES and 3DES/SHA), embedded SRAM/ROM and 2MB flash. The new platform uses FreeRTOS with open-source modules for TCP/IP, SSL/TLS, HTTP (client and server), SNTP, DHCP daemon, MQTT, XML and JSON. Development and debugging is supported by free command line tools, plus a KEIL plug-in.
Automated Deployment and Management of Edge CloudsJay Bryant
This presentation discusses the challenges of cloud computing at the edge. From the exploding number of nodes, the need for integrated monitoring and zero touch discovery. We introduce Lenovo Open Cloud Automation, an automated framework built in collaboration with Red Hat to help address these challenges.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteGoogle
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-pilot-review/
AI Pilot Review: Key Features
✅Deploy AI expert bots in Any Niche With Just A Click
✅With one keyword, generate complete funnels, websites, landing pages, and more.
✅More than 85 AI features are included in the AI pilot.
✅No setup or configuration; use your voice (like Siri) to do whatever you want.
✅You Can Use AI Pilot To Create your version of AI Pilot And Charge People For It…
✅ZERO Manual Work With AI Pilot. Never write, Design, Or Code Again.
✅ZERO Limits On Features Or Usages
✅Use Our AI-powered Traffic To Get Hundreds Of Customers
✅No Complicated Setup: Get Up And Running In 2 Minutes
✅99.99% Up-Time Guaranteed
✅30 Days Money-Back Guarantee
✅ZERO Upfront Cost
See My Other Reviews Article:
(1) TubeTrivia AI Review: https://sumonreview.com/tubetrivia-ai-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
7. 7
SSL Agenda
Application model
Unsecure communication
What is SSL?
Why do we need SSL?
How SSL works
How is SSL supported in
U2?
Certificate generation
Digital certificates
Security Context Record
(SCR)
XAdmin: Managing SCR
and U2 services
8. 8
Hypothetical Application Model
@ID 104357
FNAME John
LNAME Doe
ADDRES
S
4600 S Ulster St
CITY Denver
STATE CO
ZIP 80237
PHONE 800-426-4357
DOB 12/31/1967
SSN 123-45-6789
Client
Application
U2
Server
Extranet
Internet
U2
Server
Telnet
Client
Intranet
Firewall
U2 Web
Service
10. 10
What is SSL?
Protocol that provides privacy and reliability between
two communicating applications
U2 supports SSLv2, SSLv3,TLSv1,TLSv1.1,
TLSv1.2
• SSL (Secure Sockets Layer)
V2, V3: No longer recommended
• TLS (Transport Layer Security)
IETF standard, improvement on SSLv3
V1.0 no longer recommended
V1.1 recommended
V1.2 recommended
11. 11
SSL higher layer
SSL record layer
What is SSL?
Protocol layer
• Higher layer is used to encapsulate various application level protocols
• Record layer layered on top of a reliable transport protocol (TCP)
LDAPFTPTelnetHTTP
IP
TCP
OTHER PROTOCOL LAYERS
SSL/TLS
12. 12
Why Do We Need SSL?
Goals of communication security
• Confidentiality
Problem: Anyone can see clear text
Solution: Encrypt the text
• Message Integrity
Problem: Someone might alter the data
Solution: Guarantee the message block is original
• Endpoint Authentication
Problem: Not sure who you are talking with
Solution: Ensure the communication end point is the intended target
13. 13
Client / Server: Secure Communication
Client Hello
Server Hello
Key Exchange
Cipher Suite Negotiation
Get Data
Data Transfer
Secure Data Transfer
SSLHandshakeSSLDataTransfer
Unirpc svc name
Data Transfer
Secure credentials
14. 14
How Is SSL Supported in U2?
Server products
• Basic engine – BASIC Extensions
Secure Sockets
Secure CallHTTP (HTTPS)
Secure Soap
• Telnet server
• Unirpc services
15. 15
How Is SSL Supported in U2?
Client products
• UOJ, UniJDBC, UniOLEDB, ODBC drivers, UniObjects
• SBClient
• wIntegrate
• U2 Web Services – REST and SOAP
• UODOTNET
• U2 Web DE: 5.x
• U2 Toolkit
• U2 DBT resource view
• SB/XA
16. 16
How Is SSL Supported in U2?
Underlining technology for U2 SSL
• OpenSSL: for engine & telnet/UniObject/UniODBC/SBClient/wIntegrate
• JSSE: for UOJ, UniJDBC & U2 Web Services
• sslStream: for .NET Clients & SB/XA
18. 18
U2 Certificate Management
XAdmin
• Two-step process
Generate a Certificate Signing Request (CSR) using XAdmin, BASIC, or Java keytool
Obtain the certificate
• Two ways to obtain a certificate
Provide CSR to a third-party Certificate Authority (CA)
o Recommended for production environment
Use XAdmin to generate certificate
o Suitable for development environment or “closed world”
• Four types of certificate stores
OS-level files
Java key store
Windows Certificate Store
U2 Root Certificate Store
19. 19
Java Certificate Management
keytool
• Performs similar tasks to XAdmin SSL Configure
Certificate request (certreq)
Import of certificates (import)
• Handles both key store and trust store
• Used for Java clients & servers
UOJ, UniJDBC
U2 Soap server/Web Services Development tool
• Extracting certificates from pkcs12
20. 20
Security Context Record (SCR)
A structure used by U2 servers to store data for
an SSL session
Holds all U2 SSL related properties
Encrypted & stored in U2 SCR store
• _SECUCTX_(for UD), &SECUCTX& (for UV)
• SCR store must exist locally in each account (not file pointer)
ODBC client products do not use SCR
• SSL Configuration Editor
21. 21
XAdmin: Managing SCR and U2 Services
Two-step process
• Create a Security Context Record (SCR)
• Match the service to the SCR
Pre-requisites to creating a SCR
• Certificate(s)
Server: Requires its own certificate
Clients: Require CA-certificates to verify server
• Private key
Servers: Required
Clients: Optional
22. 22
Summary for U2 SSL
SSL is for data transmission security
U2 supports SSL in (almost) all products
Two must-know things in setting up SSL for U2
• Certificates
CA and certificate hierarchies
4 types of certificate stores
Use of XAdmin, OpenSSL, Java keytool, SSL Editor
• Security Context Record (SCR)
Associates certificates/private key to a server/client
Created by XAdmin, BASIC
Troubleshooting U2 SSL problems
• Logging is available on all servers & clients
• U2 BASIC: ProtocolLogging()
36. 36
U2 Clients - Programming
using U2.Data.Client;
…
U2ConnectionStringBuilder conn_bldr = new U2ConnectionStringBuilder();
…
conn_bldr.SslProtocols = "Tls12";
// check certificate revocation list
conn_bldr.SslCheckCertificateRevocation = false;
// check common name matches server name
conn_bldr.SslIgnoreCertificateNameMismatch = true;
// check certificate exists in root trust store
conn_bldr.SslIgnoreIncompleteCertificateChain = true;
…
41. 41
XAdmin 4.x.x
Manages
• Secure Socket Layer (SSL)
• Audit
• Advanced Data Encryption
Menus support all new features in UniData 8.1.0 and
UniVerse 11.2.5
Secure “Resource View”
42. 42
Root Certificate Store
Takes away the mystery and complexity
Secure CallHTTP and SOAP programming is
simpler
RCS is based on java 1.7 cacerts file
Updates to .u2rcs repository is a regular
administration task
43. 43
Root Certificate Store Manager
The rcsman utility manages the U2 Root Certificate Store
rcsman commands
• List
• Import
• Export
• Delete
• Change password
• help
default certificate store file = .u2rcs
49. 49
.unisecurity – secuconf Command
secuconf
• The secuconf command is used to encrypt, decrypt, or modify
the information in the .unisecurity file
• secuconf {-encrypt|-decrypt|-retag|-edit|-isencrypted}[-pass
password|- newpass new password|-out outfile|-log logfile|-
editor editor|-tag] cfgfile
54. 54
Certificate Management Tool - CMT
These statements represent Rocket Software’s current intentions. Rocket development plans are subject to change or withdrawal without further notice.
Any reliance on these statements is at the relying party’s sole risk and will not create any liability or obligation for Rocket
59. 59
Summary
Data confidentiality, integrity, and availability are under pressure
Advanced Persistent Threat (APT)
Compliance to security auditing are a necessity and complex
Upgrading is more urgent than ever to meet compliance
Rocket Software is committed to meet the security technical
challenges and changes
60. 60
A Look into the Future
TLSv1.3 – RFC-5246
• September 2015, TLS 1.3 is a working draft
• Based on the earlier TLS 1.2 specification
SHA3 (Secure Hash Algorithm 3)
• SHA-3 is not meant to replace SHA-2, as no significant attack
on SHA-2
• The SHA-3 standard was released by NIST on August 5,
2015
These statements represent Rocket Software’s current intentions. Rocket development plans are subject to change or withdrawal without further notice.
Any reliance on these statements is at the relying party’s sole risk and will not create any liability or obligation for Rocket