Guide
5th Annual IBM AIX Community Survey Findings
The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT.
More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Article
[INFOGRAPHIC] Audit Day for a System Administrator
By Chuck Losinski on Mon, 11/30/2020
Whether your IBM i audit is internal or external, once a week or once a year, the reporting process wastes time that would be better spent on projects that improve business processes. Don’t let it.
On-Demand Webinar
Eliminate the Most Common Cause of a Data Breach with Multi-Factor Authentication
By Sandi Moore
Multi-factor authentication (MFA) protects you from the most common cause of a data breach: compromised user credentials. Watch this webinar to learn how MFA can protect your IBM i systems.
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Article
Why Relying on Scripted Operations Can Be a Problem for Your Business
By Steve Brasen on Tue, 03/31/2020
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Article
Backup Basics: Saving Your Data and Your Job
By Tom Huntington on Mon, 02/24/2020
You need a backup strategy to test your company’s disaster recovery plan and, despite its reputation for reliability, administrators still need to back up their IBM i. A sound backup strategy should also restore individual user objects to account for human error.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.
On-Demand Webinar
How to Be Smart When Selecting a Job Scheduler
Watch this webinar with Fortra scheduling experts to learn which enterprise job scheduler is right for your environment.
Datasheet
Robot Schedule Interface to SAP
When you need a more dynamic job scheduler for SAP processes, simply schedule recurring jobs once in the Robot Schedule interface and there’s nothing more to do, ever.
Datasheet
Robot Schedule Interface to EnterpriseOne
Enjoy more flexibility and control over scheduling Oracle JD Edwards EnterpriseOne jobs. With the Robot Schedule interface to EnterpriseOne, data selection is dynamic, making it a snap to schedule jobs to run unattended.
Blog
The Cybersecurity Dangers of the Dark Web and How to Protect Your Organization
By Bob Erdman on Thu, 04/25/2019
As long as the dark web exists, organizations must learn more about the threat they pose, and how to protect themselves.
Datasheet
Robot Alert
Robot Alert sends and receives email, text, and SNMP messages in reaction to IBM i events.
On-Demand Webinar
5 IBM i Job Scheduling Pain Points (and How to Solve Them)
Robot Schedule automatically and reliably runs millions of iSeries jobs for organizations all over the world every day. Watch this webinar to learn how.
On-Demand Webinar
The Effects of Cloud Migration on IAM, PAM, and Audit
Tue, 09/18/2018
With the fast pace of development, companies are continually reassessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.
Blog
IBM's Steve Will Talks AS/400, Cognitive Systems, and Everything in Between
By Tom Huntington on Thu, 08/23/2018
For busy IT pros who love their IBM i (or AS/400), we've summarized Steve Will's hugely popular, 60-minute webinar in a 6-minute blog post. Enjoy!
On-Demand Webinar
AS/400 to IBM i: And We’re Just Getting Started
By Steve Will
Celebrate 30 years of innovation on IBM i with IBM’s Steve Will and Alison Butterill. Watch now!