Join IBM i CTO & Chief Architect/IBM Distinguished Engineer Steve Will and IBM Power Champion Tom Huntington on July 18th to hear their unique perspective on the direction of this platform.
What should you do if you’ve experienced identity theft? In his discussion with Investopedia, John Wilson highlights the steps to take if your identity is stolen and shares tips on how to prevent it in the first place.
Browser fingerprinting has been used by legitimate organizations to uniquely identify web browsers for nearly 15 years. In this article, Kevin Cryan explains browser fingerprinting and how cybercriminals exploit it.
How will the digital risk and email security landscape evolve in 2024? In this VM Blog article, Eric George discusses the industry's future and shares his seven predictions for 2024.
Airline customers need to be aware that their PII data could be for sale on the dark web. Nick Oram looks at how attackers use this data and provides tips on how to keep your data secure.
Why haven’t IT processes kept pace with business changes? Why are you still suffering from downtime as the result of human error? Read this article to see how legacy processing methods are still leading to downtime today—and what you can do to stop it.
This article examines some of the most popular IBM VTL (virtual tap library) solutions for IBM i and other platforms. You'll also learn what to consider to determine if VTL is right for you.
A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.
Many ERP packages have built-in schedulers. However, these schedulers are typically not flexible or robust enough to meet the needs of even the smallest data center.
There are processes that are required on your IBM i that need to run with the system in what is called a “restricted state” condition. A restricted state is when all subsystems are inactive and new jobs cannot enter the system. Only the system console might be active.
You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
How good do you feel about your backup strategies? Did you know you can perform a simple operation two to four times a year to put much of your uneasiness to rest? It’s true. Simply audit your backups.
How many separate job schedulers are you juggling? Don’t let your important processing into a scheduling circus. Stick with a single, sophisticated solution.
Your shop runs more than 30 jobs each day. Your jobs must communicate across IBM i and another OS. You need to monitor them and generate reports for audits or SLAs. Do your existing job schedulers really meet your needs?
Looking for better ways to integrate your Windows, AIX/UNIX, and Linux environments with the Robot Schedule scheduling system? Robot Schedule Enterprise commands can enhance your integration experience.
Did you know? IBM i Workload Groups are a powerful yet under-utilized feature of the operating system that have been made more flexible with IBM i 7.4 (V7R4). Read on to learn more.