Join IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington on July 18th to hear their unique perspective on the direction of this platform.
Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
The Digital Operational Resilience Act (DORA) applies to over 22,000 financial entities and ICT providers in the EU.
It introduces an end-to-end framework for effective risk managements, ICT and cyber security operational capabilities, and third-party management to assure the consistent delivery of services along the financial value chain.
This comprehensive guide covers everything you need to...
This guide explores the limitations of legacy AS400 schedulers, identifies the signs that it’s time for a change, and points to the benefits of automated operations using modern workload automation software built for IBM i.
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.
Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Employees on the front lines often possess insight that manager, directors, and executives lack.
Corporate leaders rely on feedback from these professionals, especially when it comes to emerging security threat. But for a variety of reasons, systems administrators might be reluctant to to speak up about critical issues related to IBM i, including the importance of consistently updating...
Get insider tech tips on the most helpful features of Backup, Recovery and Media Services for i (BRMS)!
What if your IBM i came equipped with a tool that could help you automate and manage backup/recovery across your enterprise IBM i environment?
What’s that, you say? It’s called BRMS for i? That’s right!
BRMS is already available as a licensed...
This guide features an easy-to-follow explanation of NIST 800-171's purpose and requirements. You’ll also get a checklist to help you evaluate your current security measures and where you need to focus your compliance efforts.
SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control?
SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across...
Compliance with Sarbanes-Oxley (SOX) is impossible without IT professionals, but translating this law into IT action items is a challenge.
With penalties up to $10 million fines and even prison time, following SOX—and proving you're compliant—is vital.
This compliance guide breaks down the most important aspects of SOX that affect IT professionals and focuses on what you need to know to get...
The Health Insurance Portability and Accountability Act (HIPAA) is one of today’s most common compliance mandates, but translating this law into IT action items is a challenge.
As fines increase and more audits are scheduled, figuring out how which data HIPAA protects and how to bring your system into compliance is more important than ever.
This compliance guide breaks down some of the thorniest...
This paper makes a case for IT centralization on IBM i and explains the important role automated systems management technologies like Robot have to play in centralized IT environments.
Combining IBM Power Systems hardware and reliable iSeries job scheduler software is a powerful investment strategy for companies that not only improves their bottom line, but enhances customer experience.