Attendance is up over last year as user group adjusts to a new economic reality.
Written by Chris Smith
The 50th anniversary of COMMON celebrated in Orlando earlier this month with the annual conference and expo was a dignified yet upbeat event that commanded the attention and support of users and IBM alike, an event by its attendance alone that suggests IBM i will evolve and remain a vital part of the IT landscape for quite some time to come.
A key element of computer security is limiting access to computing resources to only authorized personnel. For the System i, nearly two dozen products assist with this function.
Written by John Ghrist
Protecting corporate information assets and sensitive data starts with a stout lock on the "front door" of IT systems. It begins with preventing unauthorized logins to systems and restricting access to information only to those with the right to view it. At the core of providing these protections are authorization and authentication software tools.