Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  

iSeries

RSS Feed    Add to Google    Add to My Yahoo!
iSeriesReports
 
Meeting New Business Demands with Existing IBM System i Applications: A Pragmatic Approach
sponsored by Magic Software Enterprises
WHITE PAPER: Legacy application modernization is being pushed throughout the IT industry, forcing System i users to consider their options on how best to meet the needs of business services. Learn how to keep System i and create a more flexible IT environment.
Posted: 12 Feb 2007 | Published: 01 Sep 2006

Magic Software Enterprises

CoolSpools: Download
sponsored by ariadne software
TRIAL SOFTWARE: CoolSpools converts iSeries spooled file to a variety of industry-standard formats including PDF, Excel, RTF (Word), text, CSV and TIFF.
Posted: 03 Oct 2005 | Premiered: 28 Sep 2005

TOPICS:  PDF | Spool | System i
ariadne software

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis...
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

PCI Compliance for IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided.
Posted: 09 Nov 2007 | Published: 01 Nov 2007

PowerTech

IBM Eye: Security Detective for Hire
sponsored by PowerTech
TECHNICAL ARTICLE: This article will give step-by-step overview of how to deal with some of the most pervasive security threats currently facing IBM Power Systems. It'll help organizations that are struggling to get started with security and act as a 'wake-up call' for those who think that “powering the server on” is all the security they need.
Posted: 25 Sep 2009 | Published: 25 Sep 2009

PowerTech

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

An Introduction to System i High Availability
sponsored by Vision Solutions
WHITE PAPER: System i high availability requires special considerations surrounding data replication, disaster recovery and business continuity plans. Read this white paper to get an introduction to System i high availability, effective strategies and more.
Posted: 01 Apr 2007 | Published: 01 Mar 2007

Vision Solutions

Real-Time Database Sharing: What Can It Do for Your Business?
sponsored by Vision Solutions
WHITE PAPER: Got business-critical information residing on your System i as well as other databases? It’s likely you have silos of information that are difficult to share, which puts people at risk of making decisions based upon inaccurate or outdated information. Learn how new data sharing software can replicate and transform data in real-time.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Vision Solutions

SSA Goes on the Offensive against Viruses
sponsored by Bytware, Inc.
WHITE PAPER: This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems.
Posted: 29 Nov 2006 | Published: 01 Feb 2005

Bytware, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement