Analyze your iSeries performance more effectively.
Written by Sandra Chromey
Is your system running poorly and you don't understand why? Is the CPU underutilized, but customers are complaining about jobs taking too long? Are you feeling overwhelmed by the thought of managing your iSeries all on your own? Wouldn't it be great if you could talk to the performance experts and have them assess your situation?
Using a combination of software and hardware solutions can defend against data theft.
Written by Chris Smith
The best reason to encrypt your data is because you have a very good chance of losing your laptop when you're traveling. I asked a hotel clerk once if there had ever been a problem with items being stolen out of the guests' rooms. "No, not really," he said. "We have had the occasional laptop disappear, but other than that, no one ever loses anything."
To have any chance of preventing a major security breach, early detection of suspicious activities is critical. Fortunately, IBM i contains comprehensive event auditing functionality that is capable of satisfying most regulatory requirements. Using the Change Security Auditing (CHGSECAUD) command, you can create the security audit journal and the initial journal receiver, as well as configure the two main auditing system values—QAUDCTL and QAUDLVL.