Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  

IBM iSeries

RSS Feed    Add to Google    Add to My Yahoo!
IBM iSeriesReports
 
Simplify Your Life - Eliminate Passwords
sponsored by PowerTech
WHITE PAPER: Learn how to implement Single Sign-On using IBM's Enterprise Identity Mapping (EIM) infrastructure, included in i5/OS and V5R2. Easily eliminate passwords to reduce costs, satisfy your auditors, and improve productivity.
Posted: 16 Apr 2007 | Published: 19 Jul 2005

PowerTech

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

IBM Eye: Security Detective for Hire
sponsored by PowerTech
TECHNICAL ARTICLE: This article will give step-by-step overview of how to deal with some of the most pervasive security threats currently facing IBM Power Systems. It'll help organizations that are struggling to get started with security and act as a 'wake-up call' for those who think that “powering the server on” is all the security they need.
Posted: 25 Sep 2009 | Published: 25 Sep 2009

PowerTech

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

SSA Goes on the Offensive against Viruses
sponsored by Bytware, Inc.
WHITE PAPER: This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems.
Posted: 29 Nov 2006 | Published: 01 Feb 2005

Bytware, Inc.

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis...
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

Meeting New Business Demands with Existing IBM System i Applications: A Pragmatic Approach
sponsored by Magic Software Enterprises
WHITE PAPER: Legacy application modernization is being pushed throughout the IT industry, forcing System i users to consider their options on how best to meet the needs of business services. Learn how to keep System i and create a more flexible IT environment.
Posted: 12 Feb 2007 | Published: 01 Sep 2006

Magic Software Enterprises

Podcast: Automating Resource Monitoring with Robot/CONSOLE
sponsored by Help/Systems
PODCAST: Listen as we discuss the importance of monitoring and event notification for today’s computer systems. Learn about the critical role that Robot/CONSOLE can play by automating these processes.
Posted: 28 Apr 2010 | Premiered: Apr 28, 2010

Help/Systems

The Lucky 7 System i Resources
sponsored by Help/Systems
WHITE PAPER: Robot/CONSOLE©, the System i™ message management and resource monitoring software, can make you and your critical IBM i resources very lucky. With automatic resource monitoring, proactive checking keeps resources running and helps them avoid the unlucky Service Level Agreement (SLA) meeting.
Posted: 03 May 2010 | Published: 03 May 2010

Help/Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement