Watch this webinar where IBM i expert Chuck Stupca explains how FlashCopy works and discusses the ways that it helps you build a better backup strategy for your IBM i environment.
If you're a system administrator, technician, or IT manager looking to reduce and simplify your multi-platform monitoring workload, this recorded webinar is for you.
It can be scary stepping out of your comfort zone to manage and take responsibility for new technologies, but it’s also exciting—and increasingly important.
Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data.
However, allowing a user to view, update, and even delete data without any control by the...
Backup and recovery processes are among the unsung heroes of data center operations. Though end results may not be readily apparent on an everyday basis, natural and digital disasters have a way of humbling companies that do not take this risk management discipline seriously.
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
When a healthcare organization faced stringent regulations like HIPAA, PowerTech's security products closed the security gaps on IBM i and helped protect confidential data.
Halcyon’s Operations Center Suite enabled SunGard Public Sector to use an intuitive tool to automatically handle the vast majority of alerts arising from the monitoring solution, with business-critical alerts sent to a technician trained to immediately deal with systems issues.
BGL Group is one of the UK’s largest personal lines insurance groups. It has over 2,400 employees located at its headquarters in Peterborough and at contact centers in Coventry and Sunderland. The organization serves more than 4.6 million customers through a number of market-leading brands.
The City of Corpus Christi uses Halcyon’s Network Server Suite, a fully integrated solution that manages all network servers and devices from a single console, and Halcyon’s Operations Center Suite, an enterprise console for IBM i centralized monitoring and management, to streamline their department.
One of the most important IT functions in any business is having a reliable backup and recovery system in place. That’s where Robot Save plays a vital role at Prime Therapeutics.
First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...