On-Demand Webinar
Security and Audit Report Sign-Off—Made Easy
Are your security and audit reports ready if the auditors come calling? Watch this webinar to learn how to automate your approval processes so that you’re always ready for the auditors.
On-Demand Webinar
Speed Up Your Manufacturing and Distribution with Paperless Processes
Your ERP system —whether it’s JDE World, Enterprise One, Infor, Epicor, Microsoft Dynamics, VAI, or anything else—is essential to maintaining your company’s key business information and processes. But you’re constantly generating and receiving paper and electronic documents, too, and it’s hard to keep everything straight. So, you wind up chasing documents and data around—and keeping your customers...
Blog
What Should I Look for in a High Availability Solution?
By Matt Bresnan on Tue, 12/06/2016
High availability is a buyer’s world. With so many different solutions on the market, you shouldn’t be shy about shopping around until you find the right fit. Follow these tips for selecting your HA solution.
Case Study
Major Steel Supplier Strikes Gold with a Document and Forms Management Solution and Superb Support
Paperwork and steel go hand-in-hand for one major steel supplier (MSS) with locations across North America. Every piece of steel they ship includes paperwork assuring customers of the quality of the product they’re receiving.But MSS had a problem: their processes were keeping them from meeting customer expectations. It was time to make a change.The Paperwork ProblemPre-printed forms and Dot matrix...
Article
How Do I Know High Availability Is For Me?
By Tom Huntington on Fri, 11/11/2016
IBM i high availability has been at the top of your wish list for a while. Don’t let budget hold you back any longer. Discover how affordable HA can be.
Guide
Controlling SQL Updates Using Powertech Exit Point Manager for IBM i
Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data.
However, allowing a user to view, update, and even delete data without any control by the...
Blog
Three Layers of AP Automation—And How to Approach Them
Thu, 08/25/2016
Accounts payable departments run on documents—but documents don’t need to slow AP down. Read the article to learn more about AP automation.
Article
How Network Monitoring and Document Management Work Together
By Kevin Jackson on Wed, 08/24/2016
Maximize productivity and amp up your security by using network monitoring and document management solutions together.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
13 Tips to Write Secure Applications and Boost IBM i Security
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Blog
Concerns in Creating a Paperless Office
Thu, 08/18/2016
Identified as a key trend of the future and a way to improve business efficiency, the idea of a “paperless” office (or more realistically, a “less paper” office) is spreading relatively slowly. Why is that?
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article
Dealing with Temporary Files in WebDocs iSeries
Thu, 07/28/2016
WebDocs iSeries uses the IFS directory /RJSTEMP and the library RJSTEMP to store information and files temporarily. In general, it will attempt to clean up after itself, but there are situations which arise that do not perform clean up operations. As a result, files will gradually accumulate, taking up disk that could otherwise be used for other processes.
The RJSTEMP library
The RJSTEMP isn’t...
Article
Advanced Troubleshooting in WebDocs iSeries
Thu, 07/28/2016
As a WebDocs iSeries administrator, if something goes wrong your users will look to you to find, and fix, the matter. Simply knowing where to look when an initial error message is unclear can resolve a huge percentage of difficulties.
Blog
Avoiding Security Threats with Digital Document Management
By Greg J. Schmidt on Wed, 07/27/2016
Paper-based document management leaves your critical business information susceptible to damage, loss, theft, or human error. Learn how digital document management keeps your data secure.
Blog
Three Factors for Growth with Organizational Technology
Wed, 07/27/2016
Learn the three key factors involved with an organization's technological growth and how to overcome the challenges of implementing new technology amidst workplace resistance.
Blog
3 Ways Digital Document Management Helps Financial Institutions
Wed, 07/27/2016
Secure document management is an important consideration for any business, but for financial instutions in particular, keeping data secure is critical to keeping business running smoothly and clients happy. Learn how digital document management gives financial instutions the competitive edge they need to succeed.
Blog
Document Automation: The Best of Both Worlds
Wed, 07/27/2016
Using automation software with your existing document management solution can further streamline complicated or redundant business processes and maximize productivity across your company.