Fetch Reports

The Five Critical SLA Questions
sponsored by IBM
WHITE PAPER: SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

How to Manage Secure File Transfers to Meet Compliance Requirements
sponsored by IBM and SI Architects
EGUIDE: This expert eGuide will help you learn how to maintain a balance between functionality and security when it comes to wide area network (WAN) file transfers. IT expert Dan Sullivan answers questions about WAN management and how to ensure secure transfers.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

IBM and SI Architects

How to Become an SOA Superhero
sponsored by IBM
BROCHURE: This brochure shows how you can be a superhero by making WebSphere MQ the messaging backbone for your SOA, creating a common connection for the free flow of information.
Posted: 12 Feb 2009 | Published: 11 Feb 2009

IBM

Realizing the benefits of FTP consolidation
sponsored by IBM
WHITE PAPER: Businesses are experiencing a growing demand to move high volumes of data both internally and externally. File transfer protocol (FTP) servers are proliferating among individual departments and raising traffic levels with customers and suppliers. This white paper explains and explores the opportunity and benefits of FTP consolidation.
Posted: 29 Nov 2011 | Published: 28 Nov 2011

IBM

Beyond FTP: Securing and Managing File Transfers
sponsored by Linoma Software
WHITE PAPER: Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Linoma Software

New! Smart SOA Connectivity and Integration Podcast Series
sponsored by IBM
PODCAST: Listen to software development experts from the IBM® Software Development Laboratory and some of their U.S.-based counterparts explain how to reduce complexity, improve access to vital business information, and optimize IT budgets in this exclusive, listen-at-your-own-pace podcast series on Smart SOA Connectivity and Integration.
Posted: 07 Mar 2011 | Premiered: Mar 7, 2011

IBM

IBM WebSphere MQ File Transfer Edition
sponsored by IBM
WHITE PAPER: This solution brief describes how you can lower business risk and increase productivity with trusted and secured file transfers.
Posted: 07 Jul 2011 | Published: 10 Dec 2010

IBM

Case Study - Square Enix
sponsored by Riverbed Technology, Inc.
CASE STUDY: The Square Enix Group constructed an international business promotion structure with major development locations established in Japan, North America, and Europe, with develop data (ROM) transferring between locations on a daily basis. After adopting Steelhead appliances, Square Enix saw transfer times reduce by more than 90%.
Posted: 17 Jan 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Sharepoint WAN Optimization And WAFS
sponsored by Peer Software
WHITE PAPER: Design teams across the world collaborate to create and develop prod­ucts. Unfortunately, IT organizations face serious challenges when collaborative teams share large files. This white paper will assess the strengths and weaknesses of the four technologies most commonly used to enhance file sharing for distributed teams.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Peer Software

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech