Hardware  >   Computer Hardware  >   Server Hardware  >   Midrange Server Hardware  >  

iSeries

RSS Feed    Add to Google    Add to My Yahoo!
iSeriesReports
 
Robot/ SCHEDULE Enterprise: Brings Cross-Platform Success to Key Energy Services
sponsored by Help/Systems
CASE STUDY: Learn how Key Energy Services, Inc., the largest rig-based oil well services company in the industry, is using Robot/SCHEDULE - the automated, job scheduler and batch management software across multiple platforms.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

Help/Systems

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Four Things You Should Know About Cache Battery: Why Cache Battery Life Matters to Your Business
sponsored by CCSS
WHITE PAPER: Cache Battery life may be more important than you think. Learn why cache battery matters to your business, the challenge of cache battery management, the consequences of a failed battery, and the value of cache battery monitoring.
Posted: 27 Apr 2010 | Published: 27 Apr 2010

CCSS

SSA Goes on the Offensive against Viruses
sponsored by Bytware, Inc.
WHITE PAPER: This case study illustrates how the Social Security Administration achieved a new level of information protection for the System i, which includes preventing the implementation of "patched" programs that enable backdoors to this and other secure systems.
Posted: 29 Nov 2006 | Published: 01 Feb 2005

Bytware, Inc.

Simplify Your Life - Eliminate Passwords
sponsored by PowerTech
WHITE PAPER: Learn how to implement Single Sign-On using IBM's Enterprise Identity Mapping (EIM) infrastructure, included in i5/OS and V5R2. Easily eliminate passwords to reduce costs, satisfy your auditors, and improve productivity.
Posted: 16 Apr 2007 | Published: 19 Jul 2005

PowerTech

A Thirst for Efficiency: Trinks Enlists CCSS for Effective Systems Management
sponsored by CCSS
CASE STUDY: Access this resource to learn how one organization employed a network of centrally controlled IBM System i servers to monitor network issues in real-time and respond by terminating sessions when communication fails, allowing minimum disruption to workflow. Inside, learn how you can enable effective and efficient systems management.
Posted: 02 Apr 2012 | Published: 28 Mar 2012

CCSS

Drive Your Enterprise with Event-Driven Scheduling
sponsored by Help/Systems
WHITE PAPER: Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

Help/Systems

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

Real-Time Database Sharing: What Can It Do for Your Business?
sponsored by Vision Solutions
WHITE PAPER: Got business-critical information residing on your System i as well as other databases? It’s likely you have silos of information that are difficult to share, which puts people at risk of making decisions based upon inaccurate or outdated information. Learn how new data sharing software can replicate and transform data in real-time.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

Vision Solutions

The State of System i Security 2008
sponsored by PowerTech
WHITE PAPER: This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement