Software  >   Systems Software  >   Operating Systems  >  

i5/OS

RSS Feed   
i5/OS Reports
 
An Objective Approach to Security
sponsored by Bytware, Inc.
WHITE PAPER: i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
Posted: 10 Sep 2007 | Published: 01 May 2007

Bytware, Inc.

Robot/ SCHEDULE Enterprise: Brings Cross-Platform Success to Key Energy Services
sponsored by Help/Systems
CASE STUDY: Learn how Key Energy Services, Inc., the largest rig-based oil well services company in the industry, is using Robot/SCHEDULE - the automated, job scheduler and batch management software across multiple platforms.
Posted: 19 Oct 2009 | Published: 19 Oct 2009

Help/Systems

Presentation Transcript: Automating QSYSOPR Messages And Resource Monitoring With Robot/CONSOLE
sponsored by Help/Systems
PRESENTATION TRANSCRIPT: Using Robot/CONSOLE, we’ll show you how you can streamline your run book, eliminate manual tasks, and make your operations team more responsive to your critical business processes. Read this presentation transcript and learn how Robot/CONSOLE can solve the headaches of resource monitoring.
Posted: 20 May 2010 | Published: 20 May 2010

Help/Systems

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Automating Resource Monitoring with Robot/CONSOLE
sponsored by Help/Systems
WEBCAST: Using Robot/CONSOLE, we’ll show you how you can streamline your run book, eliminate manual tasks, and make your operations team more responsive to your critical business processes. Watch this FREE 30-minute Webcast and learn how Robot/CONSOLE can solve the headaches of resource monitoring.
Posted: 28 Apr 2010 | Premiered: Apr 28, 2010

Help/Systems

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

AI and Its Role in Software Development
sponsored by Crowd Machine
RESOURCE: Read the following blog post to examine AI's capabilities, how AI could benefit your enterprise, and AI's future role in software development.
Posted: 13 Aug 2019 | Published: 25 Mar 2019

Crowd Machine

Ten Ways to Improve I.T. Efficiency with a Standardized Operation Environment
sponsored by Red Hat
WHITE PAPER: A standardized operating environment ensures that your workload and infrastructure don’t get too complicated. With a standardized operating environment, IT can spend more time, money, and resources on efficiency and productivity instead. Check out Red Hat’s ten steps to improve IT efficiency with a standardized operating environment to learn more.
Posted: 18 Dec 2019 | Published: 18 Dec 2019

Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info