Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Secure PDF

      Secure PDF Files

      Secure PDF files include digital rights management (DRM) software. DRM is included at the request of the publisher, as it helps them protect their copyright by restricting file sharing. In order to read a Secure PDF, you will need to install the FileOpen Plug-In on your computer. The FileOpen Plug-In works with Adobe Reader and other viewers. Visit FileOpen to see the full list.

        What you can do with a Secure PDF:
      • Print
      • Search
      • Highlight
      • Bookmark
      Please note that some publishers - including BOMA, IADC and ICML - do not allow printing of their documents.

    • 👥
    • Immediate download
    • $389.89
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $389.89
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $525.78
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

BS ISO/IEC 30115:2018 is to define the protocols, data model, and behaviors, as well as other architectural components needed for an inter-operable, cross-vendor, remote and out-of-band capable interface that meets the expectations of Cloud and Web-based IT professionals for scalable platform management. While large scale systems are the primary focus, the specifications are also capable of being used for more traditional system platform management implementations.

The specifications define elements that are mandatory for all Redfish implementations as well as optional elements that can be chosen by system vendor or manufacturer. The specifications also define points at which OEM (system vendor) -specific extensions can be provided by a given implementation.

The specifications set normative requirements for Redfish Services and associated materials, such as Redfish Schema files. In general, the specifications do not set requirements for Redfish clients, but will indicate what a Redfish client should do in order to access and utilize a Redfish Service successfully and effectively.

The specifications do not set requirements that particular hardware or firmware must be used to implement the Redfish interfaces and functions.


Cross References:
IETF RFC 3986
IETF RFC 5789
IETF RFC 6906
IETF RFC 7231
IETF RFC 5988
IETF RFC 6901
IETF RFC 7234
IETF RFC 7235
IETF RFC 7232
IETF RFC 7230
IETF RFC 5280


All current amendments available at time of purchase are included with the purchase of this document.