The world runs on data – vast quantities of it. According to IBM, 2.5 quintillion bytes of data are generated EVERY DAY – that’s enough to fill 10 million Blu-ray discs! In most cases, this data needs to be moved from its point of initial capture to one or more locations where it will be processed and archived. This movement of data is often carried out by encapsulating sets of data in containers commonly referred to as ‘files’ and then transferring these files to where we want them to be. Business-altering and often time-critical decisions are made based on the data contained in these files, so these file transfers need to be:
- Accurate and reliable
- Fast and efficient
- Integrated with the rest of the business workflow
Many ‘stand-alone’ file transfer products do a good job of transferring files from point A to point B. JAMS Scheduler not only integrates seamlessly with standalone file transfer products; it replaces them. And, it adds significant benefits and capabilities.
JAMS makes the file transfer process an integrated part of business and IT workflows. The file transfer process becomes just another task in a workflow. This makes it easy to address one of the biggest issues with file transfer – the transferred file must be complete and not corrupted in any way in order to continue with the business process that the file transfer is related to. With JAMS it is easy to include verification tasks as part of the workflow, along with automated retry or recovery routines that can take care of the rare occasions when something, such as a network outage, goes wrong with a file transfer.
Many business or IT workflows are triggered by the arrival or creation of a file, either on a local system or even perhaps on a remote system owned by a client or business partner. Making sure that the entire file has been created before processing it is critical. With JAMS you can be sure that partial files will never be processed.
It is common for the required destination for a file to be determined in some way by the name that is associated with the file. An application name or customer name that is part of the file name might determine which directory the file should be transferred to. JAMS easily handles these kinds of rules, and can even alert you when a file with a non-standard name arrives – one that does not match any of the defined rules.
These are just a few examples of how integrating file transfer in JAMS workflows allows you to automate your file transfers in ways that stand-alone products simply cannot.
JAMS security provides the capability to store user id’s and passwords that may be required for accessing remote servers inside the JAMS database. This means that JAMS users do not need to know this information in order to set up and maintain file transfer tasks. This, along with support for encrypted file transfer, ensures that your files are moved securely and safely. JAMS centralized audit trails provides an easy way to satisfy auditors’ requirements too.
Data is the lifeblood of today’s digital businesses – JAMS File Transfer is the intelligent way to ensure that blood keeps flowing, reliably and securely.