Resources

Case Study

Financial Services Giant Optimizes, Virtualizes, and Saves Big Money

Business Value of Vityl Capacity Management (formerly TeamQuest): Vityl helped to significantly optimize the physical CPU base, maximize usage of CPU and memory resources, lower the cost per unit of CPU to clients and improve the time to market. The Fortune 500 financial services company now charges 25 percent less per unit of CPU in its virtualized environment. These benefits have helped justify...
Case Study

Capacity Planning at a Czech Bank

Organization Description: In the Czech Republic this bank serves more than 3 million clients and employs over 8000 workers. The bank operates a very extensive IT infrastructure which requires round-the-clock accessibility checks and computing capacity planning. Business Value of Vityl Capacity Management: The Vityl capacity planning solution has given the bank full control over the operations of...
Case Study

Fortra Protects the COMP Performance Group from Viruses and Malware

The COMP Performance Group™ is a world leader in the performance automotive aftermarket with core product lines that include camshafts, transmissions, drivetrain parts, fuel injection systems, and computer simulation software. After experiencing rapid growth in recent years, the organization brought on Ron Smith to launch an IT transformation project. Ron’s priorities included implementing world...
Article

Managing Your IBM i Audit Data

Let’s face it; system administration remains a largely thankless task. From scheduling jobs to balancing workloads to answering messages in QSYSOPR, administrators and operators work diligently behind the scenes to ensure that IBM i servers are available to run mission-critical applications.
Case Study

How Peoples Telephone Reboots Equipment Instantly with Network Monitoring & Automation

What if you could reduce an eight-hour outage… to no time at all? That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night,...
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Article

The Modern Alternative to Authority Adoption

There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?