Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  

AS/400

RSS Feed    Add to Google    Add to My Yahoo!
AS/400 Reports
 
A Thirst for Efficiency: Trinks Enlists CCSS for Effective Systems Management
sponsored by CCSS
CASE STUDY: Access this resource to learn how one organization employed a network of centrally controlled IBM System i servers to monitor network issues in real-time and respond by terminating sessions when communication fails, allowing minimum disruption to workflow. Inside, learn how you can enable effective and efficient systems management.
Posted: 02 Apr 2012 | Published: 28 Mar 2012

CCSS

RSA SecurID extension for the IBM System i
sponsored by Safestone Technologies
WHITE PAPER: White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

The Challenges - and Myths - of Sarbanes-Oxley Compliance
sponsored by Bytware, Inc.
WHITE PAPER: This white paper addresses the challenges and dispels the myths associated with SOX compliance in iSeries (System i) shops. It also examines the 5 steps to take toward compliance, and how to achieve CobiT objectives such as risk assessment and more.
Posted: 29 Nov 2006 | Published: 30 Aug 2004

Bytware, Inc.

CoolSpools: Download
sponsored by ariadne software
TRIAL SOFTWARE: CoolSpools converts iSeries spooled file to a variety of industry-standard formats including PDF, Excel, RTF (Word), text, CSV and TIFF.
Posted: 03 Oct 2005 | Premiered: 28 Sep 2005

TOPICS:  PDF | Spool | System i
ariadne software

Drive Your Enterprise with Event-Driven Scheduling
sponsored by Help/Systems
WHITE PAPER: Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

Help/Systems

The State of System i Security 2008
sponsored by PowerTech
WHITE PAPER: This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

PCI Compliance for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided.
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

Simplify Your Life - Eliminate Passwords
sponsored by PowerTech
WHITE PAPER: Learn how to implement Single Sign-On using IBM's Enterprise Identity Mapping (EIM) infrastructure, included in i5/OS and V5R2. Easily eliminate passwords to reduce costs, satisfy your auditors, and improve productivity.
Posted: 16 Apr 2007 | Published: 19 Jul 2005

PowerTech

An Introduction to System i High Availability
sponsored by Vision Solutions
WHITE PAPER: System i high availability requires special considerations surrounding data replication, disaster recovery and business continuity plans. Read this white paper to get an introduction to System i high availability, effective strategies and more.
Posted: 01 Apr 2007 | Published: 01 Mar 2007

Vision Solutions

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement