Resources

Guide

Going Beyond the GUI

Modernization is more than simply switching from a green screen to a GUI. To have a truly modern IBM i data center, you must consider all areas of IT from your software and applications to your hardware and devices to the processes that support the whole operation. This guides helps you modernize your IBM i from the ground up.
Guide

2023 Domain Impersonation Report

Current Domain Threats, Trends, and Techniques Domain impersonation is the foundation for a multitude of online threats. Because a domain is dynamic, identifying when and how it will be used for malicious purposes can be challenging for security teams, and requires constant monitoring for behavior that will validate removal. In the 2023 Domain Impersonation Report, we review look-alike domain...
Guide

Preventing Domain Impersonation

How to Stop Look-Alike Domains and Spoofing In the first half of 2023, cybercriminals targeted company brands using an average of 40 look-alike domains per month. Domain impersonation threats trick users into giving away sensitive information by convincing them an email is from a trusted source or a website is authentic. It’s crucial that companies take preventive measures against look-alike...
Article

The Importance of VIOS

VIOS is considered a standard in organizations running IBM i, AIX, and Linux workloads. But don’t put your business at risk by letting it run unchecked. Learn five areas you must be monitoring.
Article

How Legacy Processing in IT Leads to Downtime on IBM i

Why haven’t IT processes kept pace with business changes? Why are you still suffering from downtime as the result of human error? Read this article to see how legacy processing methods are still leading to downtime today—and what you can do to stop it.
Article

Where Does CPU Go When It’s Missing?

Have you ever noticed that the CPU used by individual jobs does not add up to 100 percent? As it turns out, your jobs and subsystems are only part of the story. For the stunning conclusion, we return you to the Licensed Internal Code (LIC).
Guide

Time to Replace Legacy AS/400 Schedulers?

This guide explores the limitations of legacy AS400 schedulers, identifies the signs that it’s time for a change, and points to the benefits of automated operations using modern workload automation software built for IBM i.
Article

Virtual Tape Considerations for IBM i

This article examines some of the most popular IBM VTL (virtual tap library) solutions for IBM i and other platforms. You'll also learn what to consider to determine if VTL is right for you.
Guide

A Guide to IBM i Message Management

This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.
Article

Eight Different Ways to Use HA at My Organization

A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.
Article

Be in Control of Your ERP

Many ERP packages have built-in schedulers. However, these schedulers are typically not flexible or robust enough to meet the needs of even the smallest data center.