At this time of year, It’s an IT Jungle tradition to ask members of the IBM i community for their thoughts on what the new year will bring. Read Tom Huntingdon’s contribution in part 1 of this predictions piece.
Learn how you can effectively and efficiently control privileged UNIX and Linux accounts from accessing data or executing any application by using centralized access management.