The AS/400 or iSeries is widely used in various departments, small companies, government agencies, and almost every industry segment. HCL’s offerings support multiple operating systems, providing you the flexibility to choose the right operating system and the right application to meet your business needs. It is designed to help simplify your IT environment and broaden your application options. We have an exceptional portfolio of software solutions that support i5/iOS, Linux, and AIX on Power processors as well as Windows and Linux applications using System x and BladeCenter integration. The system i family provides the broadest range of applications available on a single system. The ‘i’ in iSeries has always stood for integration. The design of IBM AS400 i-Series integrates the components necessary to support robust business computing components such as the operating system, middleware, database management, application servers, security, and more. Businesses are using AS400 i-Series systems for the integration of multiple computing environments and the simplification of their IT infrastructure. .
The AS400 i-Series service offerings includes monitoring, system administration, backup recovery, performance tuning, security management, network management, and SOX compliance auditing submissions. Monitoring will focus on, among others, system date/time, job queues/output queues, disk status, TCP/IP interface status, active jobs QBATCH subsystem, and basic assistance to application team like responding to a message wait. System administration will involve software installation/upgrade, user maintenance and control panel functions, dist management/capacity planning, and incident/problem management. Backup recovery will involve designing backup strategy, daily, weekly, and monthly backups, quarterly EOY backups, recovery of system configuration, and data in case of failure. Performance tuning will involve optimizing memory pools as well as monitoring system jobs, priority, and disk usage.
Security management will similarly involve system security values management, system auditing, and authority management. Network management, on the other hand, will deal with creating line, controller, and device descriptions, and TCP/IP configuration. SOX compliance auditing submissions will include monthly backup verification report, elevated access review, security baseline review, and backup configuration review.