A. It strives to protect access to design documentation.
B. It facilitates customer deployments that are more predictable.
C. It facilitates customer deployments that are less reliable.
D. It incorporates products and technologies into a broad portfolio.