Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  

AS/400

RSS Feed    Add to Google    Add to My Yahoo!
AS/400Reports
 
Robot/ SCHEDULE Enterprise: Brings Cross-Platform Success to Key Energy Services
sponsored by Help/Systems
CASE STUDY: Learn how Key Energy Services, Inc., the largest rig-based oil well services company in the industry, is using Robot/SCHEDULE - the automated, job scheduler and batch management software across multiple platforms.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

Help/Systems

Podcast: Automating Resource Monitoring with Robot/CONSOLE
sponsored by Help/Systems
PODCAST: Listen as we discuss the importance of monitoring and event notification for today’s computer systems. Learn about the critical role that Robot/CONSOLE can play by automating these processes.
Posted: 28 Apr 2010 | Premiered: Apr 28, 2010

Help/Systems

The Challenges - and Myths - of Sarbanes-Oxley Compliance
sponsored by Bytware, Inc.
WHITE PAPER: This white paper addresses the challenges and dispels the myths associated with SOX compliance in iSeries (System i) shops. It also examines the 5 steps to take toward compliance, and how to achieve CobiT objectives such as risk assessment and more.
Posted: 29 Nov 2006 | Published: 30 Aug 2004

Bytware, Inc.

Modern Developer Tools for IBM i and Power Systems
sponsored by IBM
WEBCAST: Join us for a demonstration of the Tools and ALM Solutions for the IBM I and Power Systems. Learn how these tools apply to your IT environment and how to identify and use the right tools and modernization strategy.
Posted: 19 Aug 2010 | Premiered: May 13, 2010

IBM

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

RSA SecurID extension for the IBM System i
sponsored by Safestone Technologies
WHITE PAPER: White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

TestBench for IBM iSeries: Overview
sponsored by Original Software, Inc.
PRODUCT OVERVIEW: TestBench is the most powerful and sophisticated AS400 iSeries testing capability available - for users with limited IT knowledge through to the most technically demanding developer & tester professionals.
Posted: 25 Apr 2004 | Published: 01 Apr 2004


IBM Eye: Security Detective for Hire
sponsored by PowerTech
TECHNICAL ARTICLE: This article will give step-by-step overview of how to deal with some of the most pervasive security threats currently facing IBM Power Systems. It'll help organizations that are struggling to get started with security and act as a 'wake-up call' for those who think that “powering the server on” is all the security they need.
Posted: 25 Sep 2009 | Published: 25 Sep 2009

PowerTech
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement