16
Sat, Nov
2 New Articles
MC TNT Tips n Techniques
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Choose one or more of these downloads in our MC Webcast Center

Element Break

 JUST ADDED

Implementing Multiple Layers of Defense

Your IBM i holds a massive amount of data. In most organizations, that data constitutes a mission-critical and high-value asset.

How do you adequately protect the data residing on your IBM i, given its value to your organization? IBM has provided us with many options for protecting our data, but it’s now always clear how to select and implement the best options for your circumstances.

This recorded webinar describes IBM i’s different data security options, along with implementation recommendations and tips for getting started. Carol Woodbury, one of the world’s top IBM i security experts, also provides considerations to help you determine how many layers of security are right for your organization.

Element Break

7 Habits of Highly Secure Organizations

Everyone knows that cybersecurity is important, but getting started on the road to data protection and compliance can be confusing and intimidating. Understanding common vulnerabilities helps you focus your attention and resources on the areas that need the most help.

We all want “best-practice” security, but what are top organizations doing to achieve and maintain it?

Watch this webinar to learn the details about how to develop the seven habits that are part of daily life for secure organizations. You’ll learn how to:

  • Break the Ostrich Syndrome
  • Develop a Security Policy
  • Assess Current Standing
  • Perform Security Event Logging and Review
  • Use “Best of Breed” Technologies
  • Monitor for Ongoing Compliance
  • Plan for the Future

This on-demand webinar examines what each of these habits means to IBM i, and helps you make sure that you don’t become the next security statistic.

 

Element Break

 JUST ADDED

IBM i War Stories from the Front Line

 

IBM i is great at managing varied workloads—the OS offers many built-in work management and system utilities to aid administration.

But greater customization is sometimes necessary in the line of duty.

Halcyon has built upon these utilities to deliver a number of advanced functions designed for you to take control of all of your day-to-day IBM i activities.

During this on-demand webinar, our experts will demonstrate some of Halcyon’s capabilities and describe real-life scenarios that highlight how you can:

  • Reduce your alerting footprint by implementing leading-edge monitoring techniques
  • Identify both organic growth and spikes in disk space utilization
  • Automate time-consuming housekeeping tasks
  • Take advantage of the powerful IBM i Services
  • Automate literally anything

Set your sights on having the right monitoring solution, no matter what comes your way. Watch the recording today!

 

Element Break

Multi-Platform Application Monitoring

 

Make Application Monitoring Easy Across the IBM i, Windows, AIX, and Linux Platforms in Your Environment

IT departments are constantly bombarded by information from a wide variety of operating systems, business applications, and critical processes. At the same time, the department must support a complex array of servers and devices running across their entire network.
With limited resources and the need to keep costs in check, more and more is expected of operational staff to handle this information efficiently.

In this 45-minute recorded webinar, we’ll dissect complex systems monitoring by introducing best practices and smart techniques that will help you:

  • Ensure vital business applications run smoothly and without disruption
  • Respond swiftly and with appropriate actions
  • Confirm that essential data is received at the right time
  • Prove service levels are maintained
  • Keep contingency and high availability strategies fully operational

 

Element Break

Profound UI: Unlock True Modernization from your IBM i Enterprise

 

Modern, web-based applications can make your Enterprise more efficient, connected and engaged. This session will demonstrate how the Profound UI framework is the best and most native way to convert your existing RPG applications and develop new modern applications for your business. Additionally, you will learn how you can address modernization across your Enterprise, including databases and legacy source code, with Profound Logic.

We will demonstrate how Profound UI:

  • Goes beyond simple screen-scraping to truly modernize your RPG applications
  • Uses RPG Open Access and your own RPG code and development talent to modernize
  • Supports rapid development with an easy-to-use, drag-and-drop Designer
  • Integrates with our on-the-fly modernization, mobile development, and Enterprise Modernization solutions

Element Break

 

Don't miss the full collection of On-Demand Assets available in the MC Webcast Center

BLOG COMMENTS POWERED BY DISQUS