Watch this webinar to find out how to define rules using BRMS commands, create BRMS policies, define volumes to BRMS, run backups, and restore from backups.
During this webinar, our experts demonstrate the key features that make Robot Monitor the right choice for proactive performance monitoring across your Power Systems environment.
Watch as we take the fear out of automation and show you how bots aren’t here to replace employees, but to free your employees from manual, repetitive, time consuming tasks so they can focus on more strategic activities.
A lot of businesses depend on their ERP system to conduct business. Whether it’s SAP, Syspro, Microsoft Dynamics, M1, NetSuite, or another ERP, critical data is processed and stored every day. These systems are powerful for managing business processes, but the built-in capabilities aren’t enough.
So many businesses spend hours and manual effort prepping data, launching ERP procedures, and other...
In this webinar, cybersecurity experts discuss ransomware motivations and perpetrators of attacks, who is at the highest risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses.
In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He’ll cover the security considerations that native application programmers should be keenly aware of as they design their applications.
Don’t let QZDASOINIT jobs put a stranglehold on system resources while you fly blind. Get to the bottom of job performance issues faster with Robot Monitor. Watch now!
In this webinar, IBM i security expert Sandi Moore teaches you how to correct IFS vulnerabilities that are often overlooked, including one that allows the IFS to spread malware throughout your environment.
Are you confident that your Power Systems servers are set up to handle your busiest season? Watch this webinar to learn tired-and-true methodology from the experts.
Watch this recorded webinar to get a better understanding of why IBM i jobs end up where they do and what you can do to control where they go to optimize system resources.
Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier.
One of the most serious mistakes is failing to create a well-defined security policy.
A written statement of how your...
You don't have to manually schedule PowerShell scripts anymore. Watch the webinar to learn how you can easily automate critical PowerShell processes with RPA.