Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
On-Demand Webinar
How to Convert from AJS or WRKJOBSCDE to Robot Schedule with Ease
Today’s IT teams need automation tools that can help them plan for tomorrow instead of playing catch-up. In this recorded webinar, IBM i experts introduce you to the final phase of your automation evolution: Robot Schedule.
On-Demand Webinar
IBM i Gets No Respect
Watch this webinar to learn what you should do to safeguard IBM i when adding additional partitions (VMs), standardizing technologies, migrating or consolidating servers, and more!
On-Demand Webinar
What the Latest Data Encryption Trends Mean for IBM i
By Sandi Moore
Join IBM i experts Sandi Moore and Chuck Losinski to examine why encryption has become such a hot topic in the cybersecurity community.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Article
How Legacy Processing in IT Leads to Downtime on IBM i
By Tom Huntington on Mon, 10/25/2021
Why haven’t IT processes kept pace with business changes? Why are you still suffering from downtime as the result of human error? Read this article to see how legacy processing methods are still leading to downtime today—and what you can do to stop it.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
On-Demand Webinar
How to Move to Power10 the Right Way
If you have a Power Systems hardware upgrade in your future, watch this webinar for expert tips on how to size, secure, and manage your new investment.
Article
Where Does CPU Go When It’s Missing?
By Kurt Thomas on Thu, 10/07/2021
Have you ever noticed that the CPU used by individual jobs does not add up to 100 percent? As it turns out, your jobs and subsystems are only part of the story. For the stunning conclusion, we return you to the Licensed Internal Code (LIC).
Blog
What Does IBM Power10 Mean for IBM i?
By Tom Huntington on Thu, 09/30/2021
Technology investments around IBM i shouldn’t be scary. The system is built so that the hardware can evolve while your business applications run with little or no interruption. Read on to learn more.
Article
Optimizing Containers, Kubernetes and OpenShift
By Per Bauer on Thu, 09/30/2021
The container deployment model offers component autonomy, elasticity, and scalability in a way that no other framework has done before. But to reap the benefits, you need to adopt new ways of managing and optimizing your environments and their underlying resources. Learn how to manage the performance and resource planning of container workloads.
On-Demand Webinar
Power10 Power Hour
By Dan Sundt
In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux.
Guide
Time to Replace Legacy AS/400 Schedulers?
This guide explores the limitations of legacy AS400 schedulers, identifies the signs that it’s time for a change, and points to the benefits of automated operations using modern workload automation software built for IBM i.
On-Demand Webinar
Workshop: PowerHA + Robot HA
Watch this hands-on session and learn how to work with PowerHA and journaling software like Robot HA to verify that you’re replicating what you want replicated and that you are ready for the role swap.
Article
Three Essential Steps to Successful Performance Management
Tue, 08/24/2021
Performance management is often made to look cumbersome and complex, but we’ve distilled the process down to three essential steps.
On-Demand Webinar
IBM Power Systems Modernization Series
Watch this webinar series for your FREE opportunity to learn how to maximize your IBM Power investment and right-size your modernization initiatives.
On-Demand Webinar
File Dependencies for Batch Processing
Learn how to optimize your workload by eliminating timer jobs in WRKJOBSCDE, Cron, and Windows Task Scheduler using Robot Schedule.
On-Demand Webinar
IBM i System Administrator Appreciation Day
July 30, 2021 was System Administrator Appreciation Day. This webinar is our way of saying a big THANK YOU for all your hard work.