Resources

Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Article

Using NFS with Webdocs – iSeries

Webdocs – iSeries references the documents it stores by an IFS (Integrated File System) path. There is, however, no requirement that the IFS path refer to a file system on local disk. In fact, for many Webdocs iSeries implementations, it is advantageous to store some or all of the documents from Webdocs on remote file systems that are shared using NFS (Network File System) and mounted into the IFS...
On-Demand Webinar

The Benefits of Proactive Network Monitoring

The financial ramifications of technological failure for a business can be devastating. If your company's infrastructure fails you can potentially lose business, customers, and even your reputation. Proactively monitoring your network can ensure this doesn't happen. In this webinar, learn how implementing a real-time network monitoring solution allows you to: Identify the physical location of...
On-Demand Webinar

How Tech-Driven Schools Survive and Thrive

With education technology growing rapidly, how can IT help enhance student learning so everyone can thrive? Watch this on-demand presentation for a roundtable discussion on how to champion a tech-driven education for all students.