Written by Robert Swanson
Are you on information overload from the barrage of announcements and ads for BI solutions, including IBM’s new DB2 Web Query V2.1? End the confusion and get informed. This White Paper guides you in evaluating which solution may be the best fit for your company, users, budget, environment and more. It also examines:
IBM’s analytics and services strategy
the repackaged DB2 Web QueryV2.1
IBM’s Cognos solution
other BI software in the market
The White Paper offers a comparison of these products with NGS-IQ, NGS’ scalable, proven BI suite of products used by thousands of i customers of all sizes in virtually every industry.
It concludes with a section designed to help IBM i and DB2 supporters explain the strengths of the environment to critics and the uninformed.
While one may think that PCI is a thing of the past and that it’s already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them and other organizations have started to accept credit cards when they didn’t in the past. To refresh everyone’s memory, here’s an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process or access cardholder data need to be aware of.
Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that? Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today. In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!
Have a White Paper you would like to list? click here or call (208) 629-7275 Ext.504 for information.
Introduction to Configuring iAccess Servers to use SSL
Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.