T.L. Ashford, the leader in bar code labeling software for the IBM i is sponsoring a FREE WHITE PAPER: “Bar Code / RFID Label Printing, Avoiding the Integration Traps” by Thomas M. Stockwell. This white paper examines three approaches to ADC integration with IBM i. It identifies the integration traps commonly experienced by business and then examines a better approach using native IBM i labeling software specifically designed for the IBM i architecture. Call 800-541-4893 for more information. Download White PaperOn-line Demo of Barcode400
Install IBM i over a Network File System (NFS) server using virtual optical media and enjoy the freedom of automation!
Written by Dan Boyum and Dave Snyder
The IBM i Network Install process uses virtual optical devices within a Network File System (NFS) network for installation. With new enhancements in IBM i 6.1, users now have the ability to perform installations and operating system upgrades across their networks to other IBM i partitions. In addition, users can also load PTFs or restore data via a Virtual Media Image (VMI), all without having to manually FTP the data to additional partitions. This huge advance in the IBM i installation realm will provide users with even more efficiency and flexibility in managing today's complex system environments.
Why should you use IBM i Network Install? It's quick, easy, and efficient.
Join IBM’s Mark Shearer and Vision Solutions’ Ed Vesely for an inside look at the state of resilience on IBM Power Systems, including exclusive market research. Learn how the latest IBM initiatives and performance breakthroughs can benefit your business, then drill down into the findings of a new study of 7,000 IBM i and AIX users on how they are meeting their data protection and recovery challenges. Click to view this On-Demand Webinar Now!
Raz-Lee introduces two new iSecurity modules to make multi-system administration easier.
Written by Chris Smith
More than 20 companies offer security solutions for the IBM i, a fact that represents something of an irony for a platform that is renowned for its security features. The lack of expertise within companies on how to take advantage of all the security features within the platform is legendary among security consultants who return from field assignments with eye-opening tales of horror.
Assess security vulnerabilities on an IBM i server in 15 minutes.
Written by Robin Tatam
Few words strike fear in the heart of senior executives as much as security and compliance. Satisfying stringent audit requirements has become an initiative for companies of every size, in every industry.