Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  

System i

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: eServers, IBM AS/400, IBM eServer iSeries, eServer i5, AS/400, iSeries, i5, IBM iSeries
DEFINITION: iSeries is IBM's midrange server line, designed for small businesses and departments in large enterprises. The product line, formerly known as AS/400 (still the preferred name among many long-time users ), was renamed in 2000 with the introduction of the V5R1 operating system and 800 line of servers. i5 is the latest hardware evolution of one of IBM's most widely-installed product lines.  … 
Definition continues below.
System iReports
1 - 25 of 35 Matches Previous Page  | Next Page
A Thirst for Efficiency: Trinks Enlists CCSS for Effective Systems Management
sponsored by CCSS
CASE STUDY: Access this resource to learn how one organization employed a network of centrally controlled IBM System i servers to monitor network issues in real-time and respond by terminating sessions when communication fails, allowing minimum disruption to workflow. Inside, learn how you can enable effective and efficient systems management.
Posted: 02 Apr 2012 | Published: 28 Mar 2012

CCSS

Lights Out in a Citrix Environment
sponsored by CCSS
WHITE PAPER: Access this essential resource to discover how QMessage Monitor, a message monitoring system, helped one organization complete critical processing tasks on time, eliminating the need for manual monitoring and avoiding costly downtime.
Posted: 02 Apr 2012 | Published: 30 Mar 2012

CCSS

Lights Out IBM i Automation
sponsored by CCSS
WHITE PAPER: This resource explains how you can achieve a partial, selective, and even full Lights Out Automation status in an IBM i environment. The benefits include: cost efficiency, elimination of human error incidence, and improved systems management.
Posted: 02 Apr 2012 | Published: 30 Mar 2012

CCSS

RSA SecurID extension for the IBM System i
sponsored by Safestone Technologies
WHITE PAPER: White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

Modern Developer Tools for IBM i and Power Systems
sponsored by IBM
WEBCAST: Join us for a demonstration of the Tools and ALM Solutions for the IBM I and Power Systems. Learn how these tools apply to your IT environment and how to identify and use the right tools and modernization strategy.
Posted: 19 Aug 2010 | Premiered: May 13, 2010

IBM

Real-Time Database Sharing: What Can It Do for Your Business?
sponsored by Vision Solutions
WHITE PAPER: Got business-critical information residing on your System i as well as other databases? It’s likely you have silos of information that are difficult to share, which puts people at risk of making decisions based upon inaccurate or outdated information. Learn how new data sharing software can replicate and transform data in real-time.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Vision Solutions

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

The Lucky 7 System i Resources
sponsored by Help/Systems
WHITE PAPER: Robot/CONSOLE©, the System i™ message management and resource monitoring software, can make you and your critical IBM i resources very lucky. With automatic resource monitoring, proactive checking keeps resources running and helps them avoid the unlucky Service Level Agreement (SLA) meeting.
Posted: 03 May 2010 | Published: 03 May 2010

Help/Systems

Podcast: Automating Resource Monitoring with Robot/CONSOLE
sponsored by Help/Systems
PODCAST: Listen as we discuss the importance of monitoring and event notification for today’s computer systems. Learn about the critical role that Robot/CONSOLE can play by automating these processes.
Posted: 28 Apr 2010 | Premiered: Apr 28, 2010

Help/Systems

Four Things You Should Know About Cache Battery: Why Cache Battery Life Matters to Your Business
sponsored by CCSS
WHITE PAPER: Cache Battery life may be more important than you think. Learn why cache battery matters to your business, the challenge of cache battery management, the consequences of a failed battery, and the value of cache battery monitoring.
Posted: 27 Apr 2010 | Published: 27 Apr 2010

CCSS

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Robot/ SCHEDULE Enterprise: Brings Cross-Platform Success to Key Energy Services
sponsored by Help/Systems
CASE STUDY: Learn how Key Energy Services, Inc., the largest rig-based oil well services company in the industry, is using Robot/SCHEDULE - the automated, job scheduler and batch management software across multiple platforms.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

Help/Systems

Robot/ SCHEDULE Enterprise: Improves Quality of Life at Farm Credit Bank of Texas
sponsored by Help/Systems
CASE STUDY: Read this case study to see how FCBT used Robot/ SCHEDULE to connect and coordinate their job scheduling needs across multiple systems.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

Help/Systems

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

IBM Eye: Security Detective for Hire
sponsored by PowerTech
TECHNICAL ARTICLE: This article will give step-by-step overview of how to deal with some of the most pervasive security threats currently facing IBM Power Systems. It'll help organizations that are struggling to get started with security and act as a 'wake-up call' for those who think that “powering the server on” is all the security they need.
Posted: 25 Sep 2009 | Published: 25 Sep 2009

PowerTech

Robot/SCHEDULE Enterprise
sponsored by Help/Systems
WEBCAST: Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease.
Posted: 24 Sep 2009 | Premiered: Sep 17, 2009

Help/Systems

Drive Your Enterprise with Event-Driven Scheduling
sponsored by Help/Systems
WHITE PAPER: Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

Help/Systems

The State of System i Security 2008
sponsored by PowerTech
WHITE PAPER: This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

Application Modernization: RAD for the Web Reaches System i
sponsored by CodeGear
WHITE PAPER: In this whitepaper we discuss the Delphi/400 rapid application development (RAD) environment.
Posted: 30 May 2008 | Published: 01 May 2008

CodeGear

Security Primer: Top Tips for Protecting Your System i
sponsored by Bytware, Inc.
WHITE PAPER: This E-Guide from TechTarget's Search400.com explores the many components of System i security.
Posted: 06 Mar 2008 | Published: 06 Mar 2008

Bytware, Inc.

PCI Compliance for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided.
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis...
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

An Objective Approach to Security
sponsored by Bytware, Inc.
WHITE PAPER: i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
Posted: 10 Sep 2007 | Published: 01 May 2007

Bytware, Inc.
1 - 25 of 35 Matches Previous Page    1 2    Next Page
 
SYSTEM I DEFINITION (continued): …  iSeries servers use IBM's Power5 microprocessors and are capable of running five different operating systems at the same time (AIX, Windows, Linux, OS/400, and i5/OS) on multiple partitions. IBM also offers p5 (or pSeries) servers for large enterprise users who want to run Unix systems or who need more scalability. According to Chief Scientist IBM iSeries, Dr. Frank G. Soltis, the iSeries is used by businesses all over the world, is sold in more countries than McDonald's hamburgers, and has the largest number of customers of any IBM server. Search400.com expert John Brandt explains the advantages … 
System i definition sponsored by Search400.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement