T.L. Ashford has over 30 years of experience in software development and backs that commitment with a highly qualified technical support team.
You can count on T.L. Ashford for your bar code, compliance and RFID labeling needs. Watch our video to see what Barcode400 Software can do for you. Call 800-541-4893 or use the Live Chat feature at www.tlashford.com
A few months ago, I renewed my wildcard SSL certificates from GoDaddy.com and began the process of updating both types of HTTP servers in my shop: IBM HTTP Server and IBM Domino. I usually do Domino first and then IBM HTTP Server, the latter of which is a bit of a struggle. I'll get to that.
Updating Domino is always a journey as it involves importing a new certificate into the Domino keystore and then updating the existing proprietary *.kyr key file in my primary Domino server's data directory.
What are the top 10 reasons IT projects fail? Find out in Fundamentals of Technology Project Management. This is the guide every tech project manager needs to learn vital project and people management skills. Written by certified project manager Colleen Garton, PMP, this book addresses the unique needs of the IT project manager. This second edition teaches you how to use new technologies and social media to help manage projects. Includes document templates for all phases of the project and tips on project scheduling, meeting agendas, cost analyses and more!
But for most IBM i users, the emphasis on document content is hard to escape if you're looking at apps that run directly on the i.
Written by John Ghrist
Content management as a product type across IT in general is conceptually divisible into two main categories: document content management and Web content management. When it comes to focusing on that product type more specifically in the IBM i market, though, content management takes on a more sharply document-centric tone.
As the IBM i platform closes in on its silver anniversary, there are more than a few operators with ties tracing back to the very beginning. As any one of them can tell you, their roles have likely undergone more changes than the technology itself in that time.
Step by Step Approach to Implementing Object Level Security
In this Webinar:More organizations are realizing the need for implementing object level security -- especially for database files that contain information which must comply with various laws or regulations. But the question many administrators have is, how do you secure files without breaking the application or other processes? During this presentation, security expert Carol Woodbury will discuss how. Configuration options, testing steps, "gotchas" to avoid, along with real-life examples will be presented.