This blog highlights a growing IBM i administration trend – IBM i (iSeries/AS400) application hosting A key business management principle is delegation. Perhaps that is why I hear more IBM i executives who are interested in cloud hosting. Quite simply, they want to delegate their IBM i administration. More frequently I hear interest in outsourcing IBM i administration from 3 groups: 1. Those who need IBM i administration skills, 2. Those who are interested in lowering their IT costs, … [Read more...]
Is IBM i (AS400/iSeries) Application Hosting Right For You? – Part 2
A few weeks ago I posted Is IBM i (AS400/iSeries) Application Hosting Right For You? The blog presented the 5 factors most Cloud400 users mention why they host their IBM i (AS400/iSeries) applications in the cloud. Well, here are 6 more reasons IBM i users come to us. As you may think about cloud hosting for your operation, which of the following considerations resonate with you? 1) Affordable Disaster Recovery (DR) And Business Continuity Clients can pick from several Cloud400 DR … [Read more...]
Is IBM i (AS400/iSeries) Application Hosting Right For You?
This blog presents the 5 factors most Cloud400 users mention why they host their IBM i (AS400/iSeries) applications in the cloud. Not all of these considerations may apply to your circumstance. As you may think about cloud hosting for your operation, which of the following considerations resonate with you? 1) IBM i Expertise Cloud400 users want IBM expertise for a variety of reasons. Many clients have experienced their in-house IBM i talent shrink (down-sizing, attrition, … [Read more...]
R2D2 Is Alive And Well—Inside Your IBM i (iSeries, AS400) Server
As a tribute to the new Star Wars movie “Rogue One”, this is a reprint of our R2D2 blog from last year. Happy Holidays! R2D2? That little dome-headed “droid” that always kept the Star Wars heroes one step ahead of big trouble? Well, not exactly. The one we’re talking about doesn’t roll around, nor does he chirp. But unlike the movie version, ours is real. He lives inside your IBM i server and he spends his life keeping you out of trouble…with never so much as a thank you from his … [Read more...]
Disaster Averted In The Nick Of Time
Not everyone is graced with the foresight to know when disaster is waiting to strike. But recently, Acme Refrigeration, a Louisiana wholesale supplier of heating, ventilation, air conditioning, and refrigeration products, had the wisdom to know that although predicting disaster is nearly impossible, being prepared for its inevitable appearance pays off in a big way. With their corporate office in Baton Rouge and eighteen branches serving Louisiana and Mississippi, the Acme made the decision … [Read more...]
IBM i Software Keys And Uncommon Transactions
This is a blog about 2 examples where IBM users encountered unexpected delays and expense to get the needed software keys when they replaced their donor servers with newer servers. Anyone familiar with installing IBM i software is familiar with software keys. As a quick reminder, software keys certify you have IBM authorization to use IBM licensed software on a serialized server in your enterprise. Without the software keys, the IBM software will stop working within 70 days of … [Read more...]
Is It time To Review Your IT Disaster Recovery Plan?
OK, time for a reality check. You Either Have A Recovery Plan Or You Don’t. If You Do Have A Recovery Plan, Are You Sure It Will Work? IBM reports of all businesses with recovery plans 75% do not conduct regular recovery testing. But even if things go as planned, how realistic is the plan? Industry studies document that when downtime strikes, 33% of all recoveries do not go as expected. Can You Afford To Be Down For More Than 24 Hours – And Recover With Data That Is 36-48+ Hours … [Read more...]
5 Methods To Secure Your Cloud Hosted IBM i Applications
Every user I speak to about hosting is concerned about the security of their applications and their critical data. This post discusses 5 methods to secure hosted IBM i applications and data. 1) IBM i Secure Foundation The IBM i operating system is proprietary and unique in its design. I have attached a summary of the IBM i Secure Foundation from a very helpful website: http://www-03.ibm.com/systems/power/software/i/security/integrity.html Quite simply, unlike other operating … [Read more...]
An “Inside Job” That Could Have Been Prevented
When most businesses think of security, the most they think about is a firewall between the corporate network and the Internet. The internal corporate network is often very open to make it easy for people to work. The firewall on the outside is kind of like a hard exterior with a squishy inside -- nice for a piece of candy, not so nice for the security of your data. In fact, the IT community has long debated whether the threat of an internal or external attack is of greater concern for … [Read more...]
- « Previous Page
- 1
- …
- 6
- 7
- 8