Resources

Guide

6 Users to Put on Your Security Watch List

Most IT teams have processes in place to deal with security threats like malware, spam emails, and brute-force attacks. But while these processes provide relief of mind and protection from external data breaches, it’s not always outside hackers you have to worry about. Sometimes, security threats come from the inside. In this ebook, you'll learn about eight user types we think you should put on...
Guide

10 Hidden Gems of BRMS for IBM i

Get insider tech tips on the most helpful features of Backup, Recovery and Media Services for i (BRMS)!   What if your IBM i came equipped with a tool that could help you automate and manage backup/recovery across your enterprise IBM i environment? What’s that, you say? It’s called BRMS for i? That’s right! BRMS is already available as a licensed...
Guide

IT Centralization and Robot

This paper makes a case for IT centralization on IBM i and explains the important role automated systems management technologies like Robot have to play in centralized IT environments.