Blog
Your IFS Is Probably a Treasure Trove of Unsecured Data
Wed, 09/12/2018
Consider the type of information contained in the PDFs in your directories and spooled files in your output queues. Aside from taking up disk space and consuming time during a backup, what's the issue with leaving these reports on the system? The issue is the contents of those reports, along with who has access to them.
Blog
Tips for Managing Physical, Virtual, Cloud Environments
By Per Bauer on Thu, 08/30/2018
IT infrastructure is complex today. On-prem. Off-prem. Virtualization. The cloud.
It’s up to IT to build this infrastructure, then distribute resources from its many miscellaneous parts to various services in the most efficient way possible.
With so many different environments to track—many of them walled off from one another in data silos—service issues can be difficult to diagnose and...
Blog
How to Solve the Top 5 IBM i Batch Processing Challenges
By Chuck Losinski on Mon, 08/27/2018
Learn how Robot Schedule job scheduling software can revolutionize IBM i batch process management for your organization.
Blog
IBM's Steve Will Talks AS/400, Cognitive Systems, and Everything in Between
By Tom Huntington on Thu, 08/23/2018
For busy IT pros who love their IBM i (or AS/400), we've summarized Steve Will's hugely popular, 60-minute webinar in a 6-minute blog post. Enjoy!
Blog
When Would You Notice an IBM i Security Breach?
By Robin Tatam on Fri, 08/03/2018
Data breaches are often born out of poor configuration and user indifference. They thrive on a lack of visibility. Ignore the warnings provided by your system at your peril!
Blog
Making the Best Capacity Management Tool Even Better
By Scott Adams on Mon, 07/16/2018
The best capacity management tool just got better. With just one tool, manage your entire hybrid IT environment, prevent outages, and keep services up and running.
Blog
What is an Electronic Document Management System (EDMS) and Why Do I Need One?
By Greg J. Schmidt on Thu, 06/14/2018
An EDMS (electronic document management system) provides a way to capture, manage, and retrieve your documents. Learn why it's time to get one.
Blog
Exit Points and Why Menu Security Isn’t Enough
By Robin Tatam on Wed, 05/30/2018
How do interfaces like FTP side-step IBM i menu security and give users uncontrolled data access through exit points? Robin Tatam explains in this short video.
Blog
How to Do Cloud Capacity Planning
Tue, 04/24/2018
Operating in the cloud can have some great benefits compared to operating with on-premises software. That’s why surveyed IT professionals predict 83% of enterprise workloads will be in the cloud by the year 2020.
Blog
Where to Find Work Orders When the System Goes Down
By Tom Huntington on Thu, 02/15/2018
Paper work orders are a thing of the past. But system failure could deliver a nasty surprise to manufacturers and distributors who don’t have HA in play. Read on for more.
Blog
How Spectre and Meltdown Affect Power Systems Servers
Thu, 02/08/2018
The Spectre and Meltdown vulnerabilities do affect Power Systems servers. Fortra security expert explains what we know so far and how you can stay up-to-date on patches released by IBM.
Blog
What is a Capacity Management Maturity Model?
By Per Bauer on Sat, 01/20/2018
Demands for services are increasing. High performance and reliability are expected. Yet budgets, labor and floor space are all being constrained. That’s where capacity management comes in. Capacity management can improve efficiency and guarantee reliability of your business systems.
Blog
Next Steps for Replacing IBM Content Manager
By Greg J. Schmidt on Fri, 01/19/2018
You know you need to replace IBM Content Manager. But you don’t know where to start…
Blog
NIST’s Surprising New Password Recommendation
By Robin Tatam on Fri, 01/05/2018
For a computer user, few things are more annoying than the requirement to use a password to access servers, applications, and websites. Find out how NIST's new recommendations are making passwords easier to create and maintain.
Blog
Hidden Dangers of the Lesser-Known IBM i Special Authorities
Fri, 01/05/2018
Everyone’s aware of the dangers of *ALLOBJ, *SECADM, and *SPLCTL special authorities. But what about the rest? Fortra security expert explains the issues you should be aware of when assigning the other special authorities.
Blog
Capacity Management in Operations Management [Webinar Recap]
Wed, 12/06/2017
Learn where capacity management fits into operations management today—especially as organizations move into the cloud.
Blog
Could IBM i Have Been Part of the Equifax Breach?
Tue, 11/28/2017
If IBM i was part of the Equifax data breach, what could that organization have done to protect their data? Fortra security expert has some ideas.