TBSM 1.5-BSM-0039 Verification Summary Report ---------------------------------------- This report summarizes the results of 1.5-BSM-0039 patch verification. External ID external patch # 1.5-BSM-0039 Internal ID internal patch # (if applicable) Fixes contained in patch ------------------------- See README for fixes contained in this patch. Description of testing ------------------------- Testing consisted verifying TBSM installs and comes up in an non-English environment. See TTT Database (1.5 Summer Patch) for a complete description of the testing performed. Verification Results -------------------------- 0 defects were created against Patch 39. Upon completion of the test effort, no Sev 1 or Sev 2 defects were in OPEN state. All defects written against this Patch include a "P39" prefix in the defect abstracts. See CMVC for defect details using the query: abstract like '%P39%' and addDate > '2002/05/01' order by severity Regression Tests -------------------- see "1.5 Summer Patch" bucket in TTT for details. Build Iteration ------------------- Final build verification was generated July 12, 2002 and delivered to test on 7/12/02. Architecture Configuration(s) verified -------------------------------------- TBSM Base Services and Java Console on a non-english environment. Tivoli Software Configuration used in verification *------------------------------------------------------------------------------* Product List *------------------------------------------------------------------------------* TBSM 1.5 *------------------------------------------------------------------------------* Patch List *------------------------------------------------------------------------------* Schedule Milestones ---------------------------- Verification begin date 6-04-02 Verification completion date 7-14-02 Patch Distribution Mechanism ----------------------------------------- Patch Factory Verification Performed by ---------------------------------- Name(s) of Verification Engineer Chin Lin Special Notes/Comments ----------------------------------- Please see README distributed with patch for further information.