Nobody understands the cloud. That's a common joke amongst IT professionals. It's often spoken tongue in cheek about laymen consumers uploading selfies by the millions as they constantly sync their devices without a clue in the world about what's actually happening to their data. While the concept of cloud-based data may confuse most consumers, two groups of people actually do thoroughly understand how the cloud works: the IT professionals who build and maintain the droves of servers on which all of our data is stored, and the hackers who spend their every waking moment trying to break into them.
One of the great mysteries as we walk into an IBM i shop is the lock on the computer room door. Often, when we first start consulting engagements, we are given a tour of the facility, and inevitably it includes a tour of the "raised floor" computer room, outfitted with expensive air-handling equipment and protected by a door that requires specific authorization to enter. The mystery is that, while all this expensive hardware needs physical protection, the company's most valuable assets are wide open to people who don't need access to them.
Are you on information overload from the barrage of announcements and ads for BI solutions, including IBM’s new DB2 Web Query V2.1? End the confusion and get informed. This White Paper guides you in evaluating which solution may be the best fit for your company, users, budget, environment and more. It also examines:
IBM’s analytics and services strategy
the repackaged DB2 Web QueryV2.1
IBM’s Cognos solution
other BI software in the market
The White Paper offers a comparison of these products with NGS-IQ, NGS’ scalable, proven BI suite of products used by thousands of i customers of all sizes in virtually every industry.
It concludes with a section designed to help IBM i and DB2 supporters explain the strengths of the environment to critics and the uninformed.
While one may think that PCI is a thing of the past and that it’s already been implemented, major breaches (most notably of the Target PoS systems) have brought it back into focus. Some retailers are just now understanding how PCI applies to them and other organizations have started to accept credit cards when they didn’t in the past. To refresh everyone’s memory, here’s an overview of what PCI means to the IBM i community and what organizations that use an IBM i to store, process or access cardholder data need to be aware of.
Does a virus have your server down? Perhaps it’s the latest worm, Trojan horse, buffer overflow or denial of service attack that’s got you or one of your servers down. While one of these bugs may be affecting one or more of your servers in your enterprise, it is highly unlikely that the server affected is a Power server running IBM i. IBM i may be running your core business applications or it may be hosting your web site or running Domino. Whatever its function within your enterprise IBM i has remained unaffected by virus and malware attacks. Why is that? Viruses and other ailments spread by infecting a host that is vulnerable. Let’s take a look at how IBM i and the applications running on it can remain unscathed by the viruses and malware that are so prevalent today. In this white paper, Carol Woodbury of SkyView Partners defines each “ailment” and then describe the defenses and protection mechanisms provided by IBM i to ward off the attack.
*Some offers may be limited to U.S. and/or Canadian citizens only. Please see the site for details.
The MC Resource Centers bring you the widest selection of white papers, software, webcasts and more for you to choose from and at MC Press we’re all about choice. We’re even giving one lucky person the opportunity to choose their own prize in our “It’s All About Choice” contest for a $250 Best Buy gift card. Visit the MC Webcast, MC White Paper, MC Software, MC Case Study, MC Security, and MC Disaster Recovery Centers today and select as many of the FREE offerings you would like to receive. While there, enter the contest and you may just win a $250 Best Buy gift card!
Have a White Paper you would like to list? click here or call (208) 629-7275 Ext.504 for information.
Using the Newer Clients for Accessing IBM i – Good for Security or Not
In this session, Carol is pleased to be joined by long-time friend Tim Rowe – Business Architect for Systems Management and Application Development - from IBM in Rochester, MN. Tim and Carol will be discussing the security ‘pros and cons’ of the newer strategic clients that are available for accessing IBM i – including mobile, IBM i Access Client Solutions and i Access for the Web as well as a discussion on recently discovered vulnerabilities and exploits that may – or may not - affect these clients.