Blog
What's the Difference Between a Profile Swap and Adopted Authority?
Mon, 01/16/2017
Many organizations have the requirement to reduce the number of profiles to which special authorities—especially *ALLOBJ specially authority—have been assigned. In many cases, the excess capabilities can simply be removed because they aren't required for the person to perform their job functions.
*SAVSYS special authority is a good example. Unless...
Blog
How Accurate is Education Data?
By Mike Stegeman on Tue, 01/03/2017
Education data isn’t always accurate. Discover the causes of inaccurate data and find out what your school can do to avoid them.
Blog
Modern Data Access Solutions: Are They Worth It?
Thu, 12/22/2016
Are modern data access solutions worth it? Find out!
Blog
Controlling Data Access Levels is Like Choosing a Pair of Shoes…
By Sheryl Quinlan on Mon, 11/28/2016
User empowerment isn't the same for everyone—and it shouldn't be. Find out how to get the right level of user empowerment for your business.
Blog
IT Risk Mitigation
By Per Bauer on Thu, 09/01/2016
It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks.
You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least.
And it's matched by skyrocketing consumer demand for and reliance on online services.
Bottom line: outages are more dangerous to a company...
Blog
Three Reasons You Need an Updated Security Policy
Sun, 08/21/2016
If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Blog
Hacktivists Show the Danger of Leaving IBM i Unprotected
Thu, 08/11/2016
Your IBM i is only as secure as you make it. IBM i security experts have been saying this for years, but at least one organization learned the hard way.
Blog
5 Reasons Why IBM i Users Need a Data Warehouse
By Alan Jordan on Mon, 06/27/2016
Your company already has a query and reporting tool—but how can you tell if it’s time to implement a data warehouse, too? Read this article to learn five reasons businesses choose data warehousing on IBM i.