Supported

From August to October of this year, Micro Focus held an essay contest for our customers and users in academic settings. We invited them to tell us how they are using Micro Focus products in their respective schools and universities and how our products are helping make their jobs easier. We would like to congratulate…

+ read more

netiqcoolguys
Nov 7, 2017
2:16 pm
Reads:
2,007
Score:
Unrated

We would like to congratulate Steven Tharp, Identity Services Manager at Davenport University, as the winner of our Academic contest. Steven was rewarded with a $250 Amazon gift card and a free Micro Focus Community t-shirt. Take a look at Steven’s essay here…

netiqcoolguys
Nov 7, 2017
2:16 pm
Reads:
1,592
Score:
5

As corporations continue their trend towards hybrid environments, IT organizations are discovering another level of complexity to their any, any, any initiatives. The reality is that for most environments hybrid isn’t as simple as cloud-only architectures. Included in the mix of hybrid complexity are the Identity and Access Management (IAM) capabilities that must span across…

+ read more

Kent Purdy
May 29, 2017
10:34 pm
Reads:
4,648
Score:
Unrated

Today’s “always on, always available” business culture has unintended consequences for your IT team.  IT services are expected to be instantly available at all times—and the first line that normally gets hit with complaints and ire is your IT Help Desk.  If your goal is continuous IT service delivery, then surely an important area to…

+ read more

wheaps
By: wheaps
May 19, 2017
2:08 pm
Reads:
4,228
Score:
Unrated

If your digital assets are valuable…then they are vulnerable. For years, the infrastructure engineers have taken heed of this reality with the notion of a network security layer. For years this organized approach to serve as an outline from which a systematic plan is followed to maximize its services and especially security. The same value…

+ read more

Kent Purdy
May 7, 2017
10:51 pm
Reads:
3,989
Score:
Unrated

More and more organizations are digitally transforming their business by moving to the cloud.  This isn’t surprising—but it does present a challenge to the IT team who is increasingly becoming a “broker” for these cloud services.   IT (despite not controlling the underlying infrastructure, platforms, or even applications providing the cloud service) is still on the…

+ read more

wheaps
By: wheaps
May 3, 2017
3:17 pm
Reads:
3,493
Score:
5
Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Process Automation IT Security Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Passwords Reporting Secure Access Supported Troubleshooting Workflow