Resources

Datasheet

How Fortra Supports the Zero Trust Journey

What Zero Trust means, tips for getting started, and how Fortra solutions support your Zero Trust security journey.
On-Demand Webinar

Infrastructure Protection for Proactive Security

Infrastructure Protection for Proactive Security Today’s threat landscape is moving so rapidly that it’s essential to anticipate attacks and adapt your cybersecurity strategy to avoid becoming the next security breach. Such devastating breaches can cripple an organization, slowing or halting day-to-day operations and doing significant harm to a business’ reputation. Join our infrastructure...
Case Study

Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400

Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
Article

Dealing with Temporary Files in WebDocs iSeries

WebDocs iSeries uses the IFS directory /RJSTEMP and the library RJSTEMP to store information and files temporarily. In general, it will attempt to clean up after itself, but there are situations which arise that do not perform clean up operations. As a result, files will gradually accumulate, taking up disk that could otherwise be used for other processes. The RJSTEMP library The RJSTEMP isn’t...
Article

Advanced Troubleshooting in WebDocs iSeries

As a WebDocs iSeries administrator, if something goes wrong your users will look to you to find, and fix, the matter. Simply knowing where to look when an initial error message is unclear can resolve a huge percentage of difficulties.