ComputerWeekly.com Research Library

Powered by Bitpipe.com

OS/400 Research

  • Presentation Transcript: Automating QSYSOPR Messages And Resource Monitoring With Robot/CONSOLE

    Sponsored by: Help/Systems

    Using Robot/CONSOLE, we’ll show you how you can streamline your run book, eliminate manual tasks, and make your operations team more responsive to your critical business processes. Read this presentation transcript and learn how Robot/CONSOLE can solve the headaches of resource monitoring.

  • Automating Resource Monitoring with Robot/CONSOLE

    Sponsored by: Help/Systems

    Using Robot/CONSOLE, we’ll show you how you can streamline your run book, eliminate manual tasks, and make your operations team more responsive to your critical business processes. Watch this FREE 30-minute Webcast and learn how Robot/CONSOLE can solve the headaches of resource monitoring.

  • Data Loss Prevention for IBM i

    Sponsored by: Innovatum, Inc.

    Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.

  • Robot/ SCHEDULE Enterprise: Brings Cross-Platform Success to Key Energy Services

    Sponsored by: Help/Systems

    Learn how Key Energy Services, Inc., the largest rig-based oil well services company in the industry, is using Robot/SCHEDULE - the automated, job scheduler and batch management software across multiple platforms.

  • Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command

    Sponsored by: PowerTech

    When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.

  • An Objective Approach to Security

    Sponsored by: Bytware, Inc.

    i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...

  • Modernizing System i Applications: The Integration Architecture

    Sponsored by: Databorough

    Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.