Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  


RSS Feed    Add to Google    Add to My Yahoo!
i5 White Papers (View All Report Types)
The State of System i Security 2008
sponsored by PowerTech
WHITE PAPER: This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i.
Posted: 01 Aug 2008 | Published: 01 Jul 2008


Drive Your Enterprise with Event-Driven Scheduling
sponsored by Help/Systems
WHITE PAPER: Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE.
Posted: 17 Sep 2009 | Published: 17 Sep 2009


Simplify Your Life - Eliminate Passwords
sponsored by PowerTech
WHITE PAPER: Learn how to implement Single Sign-On using IBM's Enterprise Identity Mapping (EIM) infrastructure, included in i5/OS and V5R2. Easily eliminate passwords to reduce costs, satisfy your auditors, and improve productivity.
Posted: 16 Apr 2007 | Published: 19 Jul 2005


RSA SecurID extension for the IBM System i
sponsored by Safestone Technologies
WHITE PAPER: White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

Four Things You Should Know About Cache Battery: Why Cache Battery Life Matters to Your Business
sponsored by CCSS
WHITE PAPER: Cache Battery life may be more important than you think. Learn why cache battery matters to your business, the challenge of cache battery management, the consequences of a failed battery, and the value of cache battery monitoring.
Posted: 27 Apr 2010 | Published: 27 Apr 2010


An Introduction to System i High Availability
sponsored by Vision Solutions
WHITE PAPER: System i high availability requires special considerations surrounding data replication, disaster recovery and business continuity plans. Read this white paper to get an introduction to System i high availability, effective strategies and more.
Posted: 01 Apr 2007 | Published: 01 Mar 2007

Vision Solutions

Security Primer: Top Tips for Protecting Your System i
sponsored by Bytware, Inc.
WHITE PAPER: This E-Guide from TechTarget's Search400.com explores the many components of System i security.
Posted: 06 Mar 2008 | Published: 06 Mar 2008

Bytware, Inc.

Meeting New Business Demands with Existing IBM System i Applications: A Pragmatic Approach
sponsored by Magic Software Enterprises
WHITE PAPER: Legacy application modernization is being pushed throughout the IT industry, forcing System i users to consider their options on how best to meet the needs of business services. Learn how to keep System i and create a more flexible IT environment.
Posted: 12 Feb 2007 | Published: 01 Sep 2006

Magic Software Enterprises

The State of System i Security 2007
sponsored by PowerTech
WHITE PAPER: This study highlights a number of very common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the AS/400.
Posted: 16 Apr 2007 | Published: 01 Apr 2007


Lights Out IBM i Automation
sponsored by CCSS
WHITE PAPER: This resource explains how you can achieve a partial, selective, and even full Lights Out Automation status in an IBM i environment. The benefits include: cost efficiency, elimination of human error incidence, and improved systems management.
Posted: 02 Apr 2012 | Published: 30 Mar 2012

Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
i5 White Papers | i5 Multimedia | i5 IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement