Resources

On-Demand Webinar

10 Tips for AIX Security

Attackers often target servers used for mission-critical data, and servers running AIX are no exception. In this on-demand webinar, cybersecurity expert Robin Tatam explains how a well-defined security policy can help protect your systems, focusing on the 10 most important issues to consider for setting a strong AIX security policy.
On-Demand Webinar

3 Steps to Integrated Business Process Scheduling

You use cron or the Windows Task Scheduler for scheduling on your Windows, AIX, UNIX, and Linux systems, but the program's limitations frustrate you. You have difficulty coordinating schedules among multiple servers, or you're tired of creating complex scripts to deal with dependencies in your schedule processes. In this webinar, we show you how to: Schedule a job based on a system event Set up...
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?