Resources

Case Study

Financial Group Streamlines Loan Origination with Robotic Process Automation

Aldergrove Financial Group is a community-based credit union in Frazier Valley, British Columbia that provides personal and business banking solutions to its 20,000 members. Formed in 1954 under the original name of Otter Farmers’ Institute Credit Union, Aldergrove has since merged with the Matsqui Credit Union and expanded to five branches. Aldergrove is committed to providing personal,...
Case Study

Automate Eliminates Custom Visual Basic Code for InfraSource

InfraSource Services is a fully integrated company providing construction services in gas and electric transmission, gas and electric distribution, telecommunications, and water and wastewater systems. The organization consists of several distinct operating companies strategically located throughout the United States. InfraSource is a single source provider of infrastructure construction services....
Case Study

Automating Crystal Reports with Automate Saves 20 Hours per Week for Appliance Distributor

For wholesale appliance distributor Echelon Home Products, generating and distributing reports for four different business divisions used to require at least 20 hours of weekly Crystal Reports work as well as wreak havoc among employees every Monday because of an all-day report-related network slowdown. That changed in 2008 when Echelon plugged into Automate, the robotic process automation (RPA)...
Case Study

Pacific Toxicology Laboratories Saves Time with Automate

Pacific Toxicology Laboratories (PacTox), located in Chatsworth, California, is a privately owned company that performs five distinct lab functions under one roof—drug testing, biological monitoring, medical surveillance, therapeutic drug monitoring, and forensic toxicology. PacTox's competitive advantage is its unique ability to provide integrated biological testing services. Clients include...
On-Demand Webinar

10 Tips for AIX Security

Attackers often target servers used for mission-critical data, and servers running AIX are no exception. In this on-demand webinar, cybersecurity expert Robin Tatam explains how a well-defined security policy can help protect your systems, focusing on the 10 most important issues to consider for setting a strong AIX security policy.
Case Study

Hershey Entertainment Quickly Encrypts Credit Card Data with Powertech Encryption for IBM i

Hershey Entertainment & Resorts is a privately held company located in the tourist center of Hershey, Pennsylvania, and has entertainment, resort and commercial divisions. Earlier this year, Hershey learned that because the entertainment and resort operations accept credit cards for payment, they needed the information stored by their box office ticketing and reservations applications to be...
Case Study

Field-level Encryption Helps Retail Chain Achieve PCI Compliance

Love’s Travel Stops and Country Stores, a retail travel stop chain with over 210 locations in 34 U.S. states, processes approximately 200,000 credit card transactions on a daily basis. Needing to meet PCI standards, Love’s found in Powertech Encryption for IBM i a product to encrypt credit card numbers in a way that would satisfy PCI compliance auditors. “We need to be able to access credit card...
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
On-Demand Webinar

Audit and Control of Powerful Users on IBM i

Discover the ways to control and audit the activity of powerful users, with a view to enhancing the integrity of your IBM i. With the proper controls in place, you can restrict even the most powerful users as required.
On-Demand Webinar

Cutting Through IBM i Security Confusion

In this on-demand webinar, a security expert answers questions about the most confusing aspects of IBM i security. Join us for information that's useful for beginners and veterans.
On-Demand Webinar

IBM i Audit Capabilities

Many shy away from security auditing on the IBM i, but taking a common sense approach makes it possible to eliminate the drawbacks and get the vital information we need to properly manage the system.
On-Demand Webinar

Next Generation Job Scheduling

Have you seen the new web interface for Robot Schedule? It contains current user favorites, including Schedule Activity Monitor (SAM), plus exclusive new features for diagraming job flows and sharing dashboards.
On-Demand Webinar

IBM i Meets Mobile Technology

According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.