Let’s face it, the amount of data that we have is only continuing to grow, which will become harder to manage and understand. Per IDC Research, 90 percent of data in the world today was created in the last two years, and in 2016, we entered the zettabyte era.
A huge challenge for everyone is finding the best way to convert all their data into meaningful information. But that can be tricky.
If...
Boom. Disaster strikes. Now, it’s up to you to find the tape volume that contains the lost data and restore it quickly to the correct location. Luckily, recovering your IBM i data is easy with Robot Save.
Need to access IBM i data from anywhere—not just your desk? Sequel Web Interface (SWI) makes it possible. With SWI, you can expand the use of Sequel Data Access across your organization—without maintaining any additional software. You’ll empower business users, executives, and IT alike to access important information on the go—without any hold-ups. ...
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.