Blog
IASPs: What They Are and Why You Need Them on IBM i
By Chuck Losinski on Fri, 10/16/2020
IBM i expert Chuck Stupca and Chuck Losinski presented an engaging webinar about the unique characteristics of IASPs and how application data can be seamlessly migrated to optimize system processes.
Article
Monitoring Memory Thresholds on IBM i
By Chuck Losinski on Fri, 10/16/2020
Learn how to interpret the data you find on the Work with System Status (WRKSYSSTS) panel and how to set memory thresholds to avoid thrashing and optimize IBM i performance tuning.
Case Study
Robot Console Enables Mesilla Valley Transportation to Prevent Lost Revenue
Based in Las Cruces, New Mexico, and El Paso, Texas, Mesilla Valley Transportation is one of the largest locally owned truckload carriers in the U.S. The company began in 1982 and specializes in time-sensitive service between major manufacturing areas in the U.S., Canada, and Mexico.
...
On-Demand Webinar
Robot Schedule for Beginners
Watch this webinar to learn what every beginner should know about Robot Schedule batch process management and workload automation software for IBM i (AS/400, iSeries).
Press Release
Core Security Announces Availability of Enterprise-Grade Identity Governance Software for Small and Mid-Sized Organizations
Streamlined deployment and new functionality makes IGA software a reality for SMBs.
Blog
Why Should I Automate My IBM i?
By Tom Huntington on Thu, 09/10/2020
Automation means more than efficiency, accuracy, and ROI. It has a real impact on the people who love and work with the platform every day, as well as those who will fill their shoes in days to come.
Article
Hinder Jobs to Make Life More Productive for Users
By Kurt Thomas on Mon, 09/07/2020
Control the run priority of a job based on its job CPU usage, so your IBM i has the right jobs consuming the right resources. Learn how here.
Blog
Six Strategies to Ensure You Give the Right Access to the Right People at the Right Time
Mon, 08/31/2020
Part 2 of the Improving Your Security-Efficiency Balance Series:
One of the primary challenges organizations wrestle with in identity governance is how to achieve the right balance in their company between security and efficiency. In Part 1 of the Improving Your Security-Efficiency Balance Series, we examined the unique balancing act organizations face when it comes to user access. In this blog...
Blog
5 Reasons Why Technology is Important in Education
By Kevin Jackson on Mon, 08/24/2020
Great learning doesn’t depend on digital tools. So is technology important in education? Two leading IT pros share why they believe the answer is yes.
Article
IBM i Cloud Security Considerations
Fri, 08/14/2020
As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere.
Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts:
...
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
On-Demand Webinar
How to Upgrade to IBM i 7.4
It’s more work to plan an upgrade than to make the upgrade itself. Darren Anderson and IBM Champion Tom Huntington help you discover what you need to upgrade to IBM i 7.4.
Press Release
Core Security Announces New Flexible Licensing and Product Release Cycle for Core Impact
Core Security, a Fortra Company, today announced a new version of its award-winning penetration testing software Core Impact. This version adds flexible licensing, a more frequent, streamlined release process, and new product features to increase convenience and usability.
On-Demand Webinar
Ask the Experts: Power Hardware Upgrades
By Randy Watson
This webinar is a unique, online opportunity to hear how you can make smart technology decisions around your next Power hardware upgrade.
Blog
Open Source SIEM vs. Enterprise-Level SIEM: Which Is Right for You?
Thu, 07/16/2020
Open source and enterprise-level SIEM solutions all have pros and cons. Here are some factors to look at when comparing your options—including one you might not have considered yet.
On-Demand Webinar
IBM i Solution Edition Program Explained
When it comes to hardware and software upgrades, don’t leave anything on the table! Know your options and then talk to your business partner, so you can see a higher return on your POWER9 investment.
Blog
Why is Bandwidth Monitoring Important?
By Kevin Jackson on Fri, 06/26/2020
What's the importance of bandwidth speed, capacity, and usage? Learn why monitoring these key metrics can help meaintain peak network performance.
Article
How to Find Your "Normal" with Network Monitoring Software
By Kevin Jackson on Fri, 06/26/2020
With network monitoring software, you can determine what “normal” looks like for your network to easily spot abnormalities, increase uptime, and optimize performance levels.