Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  

AS/400

RSS Feed    Add to Google    Add to My Yahoo!
AS/400 Reports
 
A Thirst for Efficiency: Trinks Enlists CCSS for Effective Systems Management
sponsored by CCSS
CASE STUDY: Access this resource to learn how one organization employed a network of centrally controlled IBM System i servers to monitor network issues in real-time and respond by terminating sessions when communication fails, allowing minimum disruption to workflow. Inside, learn how you can enable effective and efficient systems management.
Posted: 02 Apr 2012 | Published: 28 Mar 2012

CCSS

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

PowerTech Easy Pass Saves Chisago County Time and Valuable Resources
sponsored by PowerTech
CASE STUDY: Chisago County needed a preventative measure to increase their level of AS/400 security and to eliminate the need for users to write down their passwords which posed a real security threat. They also needed a low maintenance solution. Enter PowerTech.
Posted: 16 Apr 2007 | Published: 02 Oct 2006

PowerTech

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

Real-Time Database Sharing: What Can It Do for Your Business?
sponsored by Vision Solutions
WHITE PAPER: Got business-critical information residing on your System i as well as other databases? It’s likely you have silos of information that are difficult to share, which puts people at risk of making decisions based upon inaccurate or outdated information. Learn how new data sharing software can replicate and transform data in real-time.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Vision Solutions

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

SSA Goes on the Offensive against Viruses
sponsored by Bytware, Inc.
WHITE PAPER: This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems.
Posted: 29 Nov 2006 | Published: 01 Feb 2005

Bytware, Inc.

PCI Compliance for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided.
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

Lights Out in a Citrix Environment
sponsored by CCSS
WHITE PAPER: Access this essential resource to discover how QMessage Monitor, a message monitoring system, helped one organization complete critical processing tasks on time, eliminating the need for manual monitoring and avoiding costly downtime.
Posted: 02 Apr 2012 | Published: 30 Mar 2012

CCSS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement