Thought I would add a quick post as we have not done any for some time. We have been working away on our next product that will interface with Nagios, the original idea of using […]
Electronic signatures in InterFormNG2
You can be a proactive, informed company and still become a victim. Learn what you can do to minimize your #ransomware risk. #IBMi #Cybersecurity #ITsecurity #infosec
You can be a proactive, informed company and still become a victim. Learn what you can do to minimize your #ransomware risk. #IBMi #Cybersecurity #ITsecurity #infosec hubs.ly/H0X1QP10
– Bill Onion (@billonion)06:03 – Sep 21, 2021
Simplify IBM i Connectivity to Accelerate eCommerce Integration
As the environment continues to modernize and adapt, IBM i users are looking to provide “anywhere, anytime, any device” access to their IBM i. Executives are looking to create new sources of revenue by leveraging ecommerce technology like Adobe Commerce, powered by Magento. Salespeople want to be able to check inventory and enter orders via mobile devices. Manufacturers want to gather information directly from the shop floor. Distributors want to get instant updates from their warehouses. Many IBM i users want to streamline business processes by integrating applications that run on disparate platforms.
Taking a Proactive Approach to IBM i Security
We’ve been screaming from the proverbial rooftop for a while now that while the IBM i / AS400 systems were once considered impermeable due to their uniqueness and obscurity, that’s simply not true anymore. With ransomware attacks continuing to make headline news, companies and CISOs should be asking themselves, am I next? What am I currently doing and what should I be doing to protect my data against attacks?