Software  >   Systems Software  >   Operating Systems  >  

iSeries Software

RSS Feed    Add to Google    Add to My Yahoo!
iSeries SoftwareWhite Papers (View All Report Types)
 
Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

An Objective Approach to Security
sponsored by Bytware, Inc.
WHITE PAPER: i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
Posted: 10 Sep 2007 | Published: 01 May 2007

Bytware, Inc.

The Challenges - and Myths - of Sarbanes-Oxley Compliance
sponsored by Bytware, Inc.
WHITE PAPER: This white paper addresses the challenges and dispels the myths associated with SOX compliance in iSeries (System i) shops. It also examines the 5 steps to take toward compliance, and how to achieve CobiT objectives such as risk assessment and more.
Posted: 29 Nov 2006 | Published: 30 Aug 2004

Bytware, Inc.

Meeting New Business Demands with Existing IBM System i Applications: A Pragmatic Approach
sponsored by Magic Software Enterprises
WHITE PAPER: Legacy application modernization is being pushed throughout the IT industry, forcing System i users to consider their options on how best to meet the needs of business services. Learn how to keep System i and create a more flexible IT environment.
Posted: 12 Feb 2007 | Published: 01 Sep 2006

Magic Software Enterprises

SSA Goes on the Offensive against Viruses
sponsored by Bytware, Inc.
WHITE PAPER: This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems.
Posted: 29 Nov 2006 | Published: 01 Feb 2005

Bytware, Inc.

Four Things You Should Know About Cache Battery: Why Cache Battery Life Matters to Your Business
sponsored by CCSS
WHITE PAPER: Cache Battery life may be more important than you think. Learn why cache battery matters to your business, the challenge of cache battery management, the consequences of a failed battery, and the value of cache battery monitoring.
Posted: 27 Apr 2010 | Published: 27 Apr 2010

CCSS

The Value of Upgrading ERP: Maintaining Modern Technology
sponsored by Sage Software
WHITE PAPER: Find out why so many organizations are choosing to upgrade their ERP systems, and get insights into the enhanced capabilities and benefits they gain from implementation.
Posted: 29 May 2014 | Published: 28 Feb 2014

Sage Software

How a Successful ECM Project Becomes a Despised Legacy Application and 5 Ways to Prevent It
sponsored by Hyland Software
WHITE PAPER: Discover the top five challenges that arise from organization's making the "easy choice" and how involving IT in the buying process allows organization to select a solution that leads to success throughout the lifetime of an ECM solution.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Hyland Software

Red Hat Enterprise Linux Desktop Datasheet
sponsored by Red Hat
WHITE PAPER: This whitepaper will help you learn how Red Hat Enterprise Linux provides a cost-effective alternative to proprietary operating systems, making it extremely attractive to those businesses that don't have a bigbudget but still want reliable, secure desktop for their users.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement