Resources

Article

Using Automate to Facilitate SQL Bulk Inserts

Can Automate interact with databases? Yes. Can Automate interact/manipulate files? Yes.   With these two questions answered, the inevitable question is next: If Automate can do both of these things, can it also load the content of files into SQL? This question comes up quite often during our consultation calls, so let’s skip the phone call and...
Article

OCR & Active Directory Automation

In this blog post we will go over how to integrate OCR automation with Active Directory automation for a new hire’s application. We will explore reading a name, address and telephone number from an application image, and creating an Active Directory User with AutoMate’s OCR, Active Directory, Loop and Flow Control Actions.
Article

Beta 3 Now Available; with 64-Bit Support

Text We recently released 10.0.0.35 Beta 3, which is now available for download. There are two new features included in this release: 64-Bit Support: The Beta 3 release comes with four installers: Automate 10 x86, Automate 10 x64, Automate BPA Server 10 x86 and...
Article

Automate & Automate BPA Server 9.0.3 Release

Version 9.0.3 of both Automate and Automate BPA Server has just been released. Version 9.0.3 addresses 44 issues, including various action enhancements and issues that were introduced in 9.0.0, 9.0.1, and 9.0.2. With each release, however minor, we want to continue our efforts to deliver a more stable software to our customers. /blog/automate-automate-bpa-server-903-release
Article

Automate VMware - Automate 8 Tour: Part 2

Text   The Benefits of Virtualization Virtualization is one of the hottest trends in I.T. today. Virtualization has valuable applications for controlling hardware costs, minimizing downtime, and many quality assurance...
Case Study

Alon USA Locks Down the IFS with Powertech Antivirus for IBM i

Like many IBM shops, Alon USA found comfort in the seeming immunity of IBM i to viruses. All PCs in the company were running anti-virus software but, having operated for more than a decade without incident, Alon USA’s IT director saw no need for protective measures on IBM i. Sound familiar?
Guide

Getting Started with IBM i Security

From beginner basics to advanced tactics, this white paper provides the background and instruction you need to restore your IBM i security back to its former glory.
Case Study

Powertech Helps Community Bank Enforce Internal iSeries Compliance

First Security Bank is one of Montana’s largest, locally owned community banks. They provide business, real estate, consumer and agricultural loans, Internet banking, brokerage services, and a full range of deposit accounts. First Security has over 150 users on a System i 525 that...
Case Study

Powertech Protects City Data and Vital Services with System i Security

The City of Warren recognizes the importance of System i network security. Their System i runs many critical applications, including human resources, payroll, and accounts payable and stores over 22,000 utility customer’s personal data, including monthly bank draft...
Case Study

Powertech Helps C&D Technologies Achieve AS/400 SOX Compliance

As a publicly traded company with a lean IT department, C&D Technologies has been greatly impacted by Sarbanes-Oxley (SOX) regulations. Despite its size, the IT department needed to comply with these regulations through better user management, monitoring, and reporting...
Case Study

Powertech Helps the Seneca Nation Play the Security Game

The SGC has a fairly large IBM i presence, including multiple production, development, test, and training systems, in a High Availability (HA) environment. They rely heavily on their IBM i servers to run their distributed properties, including casinos, hotels, resorts, retail outlets...