Software  >   Systems Software  >   Operating Systems  >  

Operating System 400

RSS Feed    Add to Google    Add to My Yahoo!
Operating System 400 White Papers (View All Report Types)
 
An Objective Approach to Security
sponsored by Bytware, Inc.
WHITE PAPER: i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
Posted: 10 Sep 2007 | Published: 01 May 2007

Bytware, Inc.

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

The Challenges - and Myths - of Sarbanes-Oxley Compliance
sponsored by Bytware, Inc.
WHITE PAPER: This white paper addresses the challenges and dispels the myths associated with SOX compliance in iSeries (System i) shops. It also examines the 5 steps to take toward compliance, and how to achieve CobiT objectives such as risk assessment and more.
Posted: 29 Nov 2006 | Published: 30 Aug 2004

Bytware, Inc.

Four Things You Should Know About Cache Battery: Why Cache Battery Life Matters to Your Business
sponsored by CCSS
WHITE PAPER: Cache Battery life may be more important than you think. Learn why cache battery matters to your business, the challenge of cache battery management, the consequences of a failed battery, and the value of cache battery monitoring.
Posted: 27 Apr 2010 | Published: 27 Apr 2010

CCSS

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

Meeting New Business Demands with Existing IBM System i Applications: A Pragmatic Approach
sponsored by Magic Software Enterprises
WHITE PAPER: Legacy application modernization is being pushed throughout the IT industry, forcing System i users to consider their options on how best to meet the needs of business services. Learn how to keep System i and create a more flexible IT environment.
Posted: 12 Feb 2007 | Published: 01 Sep 2006

Magic Software Enterprises

SSA Goes on the Offensive against Viruses
sponsored by Bytware, Inc.
WHITE PAPER: This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems.
Posted: 29 Nov 2006 | Published: 01 Feb 2005

Bytware, Inc.

Simplify your Migration to Windows® 10 and Beyond
sponsored by Citrix
WHITE PAPER: Windows 10 is poised to become the most rapid OS migration in history—driven as much by users as by IT. Learn how IT can streamline OS migrations now and in the future with a virtualized infrastructure that simplifies BYOD, app compatibility and corporate desktop management.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Citrix

Resolving Data Conflicts with Offline Mobile Apps
sponsored by Alpha Software Inc.
WHITE PAPER: Discover how to build mobile apps that perform seamlessly even when taken offline to resolve key issues like data conflicts and data synchronization with your server database.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

Alpha Software Inc.

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network
sponsored by nCircle
WHITE PAPER: This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact.
Posted: 28 Aug 2017 | Published: 02 Aug 2010

nCircle
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement