Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  

i5

RSS Feed    Add to Google    Add to My Yahoo!
i5 Reports
 
An Introduction to System i High Availability
sponsored by Vision Solutions
WHITE PAPER: System i high availability requires special considerations surrounding data replication, disaster recovery and business continuity plans. Read this white paper to get an introduction to System i high availability, effective strategies and more.
Posted: 01 Apr 2007 | Published: 01 Mar 2007

Vision Solutions

A Thirst for Efficiency: Trinks Enlists CCSS for Effective Systems Management
sponsored by CCSS
CASE STUDY: Access this resource to learn how one organization employed a network of centrally controlled IBM System i servers to monitor network issues in real-time and respond by terminating sessions when communication fails, allowing minimum disruption to workflow. Inside, learn how you can enable effective and efficient systems management.
Posted: 02 Apr 2012 | Published: 28 Mar 2012

CCSS

Four Things You Should Know About Cache Battery: Why Cache Battery Life Matters to Your Business
sponsored by CCSS
WHITE PAPER: Cache Battery life may be more important than you think. Learn why cache battery matters to your business, the challenge of cache battery management, the consequences of a failed battery, and the value of cache battery monitoring.
Posted: 27 Apr 2010 | Published: 27 Apr 2010

CCSS

Security Primer: Top Tips for Protecting Your System i
sponsored by Bytware, Inc.
WHITE PAPER: This E-Guide from TechTarget's Search400.com explores the many components of System i security.
Posted: 06 Mar 2008 | Published: 06 Mar 2008

Bytware, Inc.

RSA SecurID extension for the IBM System i
sponsored by Safestone Technologies
WHITE PAPER: White Paper: for RSA SecurID users - read on to learn more about how to increase security and efficiency, by extending your RSA dual factor authentication solution to access critical information on the IBM System i. It helps organizations meet compliance standards and improve their existing security environment.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Safestone Technologies

Simplify Your Life - Eliminate Passwords
sponsored by PowerTech
WHITE PAPER: Learn how to implement Single Sign-On using IBM's Enterprise Identity Mapping (EIM) infrastructure, included in i5/OS and V5R2. Easily eliminate passwords to reduce costs, satisfy your auditors, and improve productivity.
Posted: 16 Apr 2007 | Published: 19 Jul 2005

PowerTech

PowerTech Easy Pass Saves Chisago County Time and Valuable Resources
sponsored by PowerTech
CASE STUDY: Chisago County needed a preventative measure to increase their level of AS/400 security and to eliminate the need for users to write down their passwords which posed a real security threat. They also needed a low maintenance solution. Enter PowerTech.
Posted: 16 Apr 2007 | Published: 02 Oct 2006

PowerTech

Robot/ SCHEDULE Enterprise: Brings Cross-Platform Success to Key Energy Services
sponsored by Help/Systems
CASE STUDY: Learn how Key Energy Services, Inc., the largest rig-based oil well services company in the industry, is using Robot/SCHEDULE - the automated, job scheduler and batch management software across multiple platforms.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

Help/Systems

Real-Time Database Sharing: What Can It Do for Your Business?
sponsored by Vision Solutions
WHITE PAPER: Got business-critical information residing on your System i as well as other databases? It’s likely you have silos of information that are difficult to share, which puts people at risk of making decisions based upon inaccurate or outdated information. Learn how new data sharing software can replicate and transform data in real-time.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Vision Solutions

The Lucky 7 System i Resources
sponsored by Help/Systems
WHITE PAPER: Robot/CONSOLE©, the System i™ message management and resource monitoring software, can make you and your critical IBM i resources very lucky. With automatic resource monitoring, proactive checking keeps resources running and helps them avoid the unlucky Service Level Agreement (SLA) meeting.
Posted: 03 May 2010 | Published: 03 May 2010

Help/Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
i5 White Papers | i5 Multimedia | i5 IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement