Resources

Article

Astronauts Rely on Checklists (and So Should You)

What do astronauts and IBM i admins have in common? Checklists! These seemingly simple yet effective devices serve as our external memories and deliver process consistency, but they’re not without limitations.
Article

4 Reasons to Add VTLs

Backup and recovery processes are among the unsung heroes of data center operations. Though end results may not be readily apparent on an everyday basis, natural and digital disasters have a way of humbling companies that do not take this risk management discipline seriously.
Article

Increase Productivity with Sequel View Builder

Business success hinges on sharing relevant information with the people who need it. When members of your organization can make informed decisions, productivity increases and problems can be solved more creatively. With Sequel Data Access, more business users within your organization can see these benefits on an even greater scale. Not using Sequel yet? Learn more > Using Sequel? Keep...
Article

Disks Busy vs. ASP Busy in Robot Monitor

Did you know that the Disks Busy monitor reports the average percentage across all your ASPs, not just System ASP? You could be teetering near an I/O overload and not know it! If you have multiple ASPs, use the ASP Busy monitor instead. Here’s why.
Article

High Availability Fail Tales (and How to Avoid Them)

Chasing a high availability state is a common goal for IBM i administrators and one that can be thwarted by a single issue left unattended. By sharing some of the most frequent tales of what went wrong from real-world environments, you’ll be able to avoid these same scenarios.
Article

A Modern Approach to Performance Management

Using modern performance monitoring tools, you can build a successful strategy for performance management and quickly add value in your organization.
Article

Monitoring the Demands of Fast Disk

The IT industry is decisively moving away from traditional hard disk drives (“platters”) in favor of Flash-based solid-state drives (SSDs). It’s a welcome change; it makes much more sense to circulate only electrons instead of disks of metal with electrons on them.
Article

Small but MIGHTY: Controlling the *CLS Object Type

While the instinct for administrators and IT managers is to always hunt down a culprit – a rogue job, an inactive journal receiver, or something else – sometimes the very building blocks of a common process, or rather the specifics that define processes, can be where the trouble at hand resides.
Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Article

Database 101: Why You Can Rely on IBM i

IBM i is the perfect environment for data access and reporting. Read this article to learn how you can better utilize your Power Systems databases.
Article

Improve Event Auditing Using the System Audit Journal

With any security implementation, established rules become less effective as time passes. Because your security requirements and your systems aren’t static, you must continually audit and adapt your security plan to stay current. Be aware that your system is constantly changing.
Article

How Banks Leverage Big Data for Big Value

Technology professionals in the banking industry face a wide range of concerns due to the nature of the data stored within their systems. The potential reward in stealing or compromising financial data makes these organizations a prime target for cybercrime, while stringent industry regulations require security to be extremely tight at all times. Is it possible to strike a balance between defensive, regulatory, and data access needs and still provide access to data for analytics without compromising the security of the entire system? The truth is that many organizations in the financial sector have deployed analytics technology while being able to keep their security tight, and are benefiting from it.
Article

Top 10 Ways Sequel Makes Your Life Easier

Text     No matter what industry you’re in, accessing and presenting your data is incredibly important. Your business users’ ability to make informed decisions shouldn’t be limited by your data access tool or their...