How do you calculate the return on investment (ROI) of a network monitoring software? Learn the problems a network monitoring solution can solve and how to easily calculate its ROI.
Introduced by IBM to support TCP/IP services, a profile swap allows a job to change midstream and run under a different profile than the one that started it.
During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Your IBM i power users are one of your greatest assets. But on most systems, they're also one of your greatest security vulnerabilities. Find out how to regain control.
We recently surveyed our Robot Schedule technical support group for “ah ha!” moments that they’ve helped customers realize over the past few years. These tips from our tech gurus have helped customers automate jobs that needed to check a data area before running, track non-Robot jobs for reporting purposes, and check the status of a file before running a job.
The operations team was excited to share how Robot job scheduling and monitoring software has helped them manage their processing needs across platforms from their IBM i.
Have you seen the new web interface for Robot Schedule? It contains current user favorites, including Schedule Activity Monitor (SAM), plus exclusive new features for diagraming job flows and sharing dashboards.
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
Typical “computerized” business processes are a combination of multiple schedulers, operational scripts, CL programs, and manual file checking, all backed up with the trusty runbook. Is there a better way to manage business processes? You bet!
See firsthand the flexibility that file monitoring brings to your schedule by allowing event-driven scheduling based on file creation, deletion, and file size.
Your IBM i expert can't always be there. Learn how to harness their knowledge and automate interactive processes in your green screen IBM i applications.
Could an automation tool like Robot job scheduling software for IBM i help your application development team be more productive? Yes, actually. Watch this webinar to see how.