IBM System i (iSeries, AS/400)
IBM System i
Never spend another hour reloading or rebuilding your systems. The IBM System i (iSeries, AS/400) is the most powerful and versatile business server on the market today. aXs Information Technology, LLC is an expert on the IBM System i platform. Our $100 million equipment inventory includes refurbished IBM i5 systems as well as older generation equipment, and all aXs IT equipment is thoroughly tested and aXs IT Certified before leaving our warehouse. We can provide complete IBM systems as well as memory and disk upgrades. In addition to our equipment inventory, aXs Information Technology, LLC has skilled, certified engineers who can help determine the best IBM solution for your business needs, then configure, deliver, install and maintain the box for you.
Benefits of IBM System i
- Simplicity - the System i is all-in-one hardware for server, storage, software, and security needs
- Security - the System i server is virus-resistant, so it keeps data safe
- Flexibility - Java, Linux, UNIX, Windows, i5/OS - run it all on the System i
aXs Information Technology, LLC offers the following refurbished IBM System i products:
| Model Commercial Processing Workload (CPW) range |
|
520 600-7100 550 3800-14000 570 8100-58500 595 13600-184000 |
| 2nd Generation Machines | 3rd Generation Machines | 2xx machines |
|
800 2463
800 2464 810 2465 #7406 810 2466 #7409 810 2467 #7412 810 2469 #7430 825 2473 7418 (3 way) 825 2473 7418 (4 way) 870 2486 7421 ent 870 2489 7433 ent 890 2497 7424 |
820 2395 820 2396 820 2398 820 2436 820 2438 1521 interactive 1522 interactive 1523 interactive 1524 interactive 1525 interactive 1526 interactive 1527 interactive 830 2400 830 2402 830 2403 830 2349 1531 interactive 1532 interactive 1533 interactive 1534 interactive 1535 interactive 1536 interactive |
250 2295 & 2296 270 2248 1517 270 2431 1518 270 2252 1519 270 2432 1519 270 2434 1516 270 2434 1520 |
aXs IT Whitepaper
aXs IT Whitepaper
Protecting Your Enterprise with an Effective Data Erasure Strategy
Learn how to ensure the removal of sensitive infomation from IT assets.
