iSeries Software White Papers

(View All Report Types)
Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Modernizing System i Applications: The Integration Architecture
sponsored by Databorough
WHITE PAPER: Refactoring legacy applications on the System i into modern architecture is the biggest challenge in business software today. Read this white paper to get the information necessary to achieving this strategic objective.
Posted: 04 Jun 2007 | Published: 01 Jun 2007

Databorough

An Objective Approach to Security
sponsored by Bytware, Inc.
WHITE PAPER: i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
Posted: 10 Sep 2007 | Published: 01 May 2007

Bytware, Inc.

Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER: In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

The Role of the Operating System in Cloud Environments
sponsored by Red Hat
WHITE PAPER: Download this exclusive whitepaper today and discover the crucial elements you need to consider to create an operationally sophisticated hybrid cloud computing environment.
Posted: 10 Dec 2013 | Published: 31 Dec 2011

Red Hat

Determining the Most Effective Endpont Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Why Do Techies Tell Me to Ping a Website?
sponsored by Global Knowledge
WHITE PAPER: This white paper explores ping commands and flags, and how those flags vary from one operating system to another. With a better understanding of ping, organizations and home users can easily troubleshoot a network.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Global Knowledge

The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: This Forrester Total Economic Impactâ„¢ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months.
Posted: 01 Aug 2013 | Published: 31 Jul 2013

WANdisco

How Red Hat Delivers a Secure Enterprise Platform for Next-Generation DataCenters
sponsored by Red Hat
WHITE PAPER: This whitepaper will introduce you to the key differentiators that set Red Hat Enterprise Linux apart in regards to security for next-generation datacenters. Read on to learn more.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

Red Hat