Resources

Blog

Lessons Learned from IBM's Native Scheduler

The systems that businesses rely on today are increasingly complex and challenging to manage without sophisticated job scheduling tools. According to the annual IBM i Marketplace Survey Results, only 22 percent of IBM i shops are running the IBM i operating system exclusively. 68 percent are also running the Windows OS, another 56 percent are running Linux, and 26 percent are running AIX. That...
On-Demand Webinar

How to Move to Power10 the Right Way

If you have a Power Systems hardware upgrade in your future, watch this webinar for expert tips on how to size, secure, and manage your new investment.
On-Demand Webinar

Power10 Power Hour

In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux.
Guide

5th Annual IBM AIX Community Survey Findings

The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Blog

Increased Home Working is Recognized by CISOs as the Cybersecurity Threat with the Potential to Cause the Most Damage

We work with many of the biggest Financial Services (FS) enterprises in the US and hear first-hand about some of the cybersecurity challenges they face on a daily basis. It’s a tough world out there and it’s getting tougher, according to the findings in our recent survey of 250 global FS CISOs and CIOs.Almost two-thirds of global FS firms have...
Blog

Six Strategies to Ensure You Give the Right Access to the Right People at the Right Time

Part 2 of the Improving Your Security-Efficiency Balance Series: One of the primary challenges organizations wrestle with in identity governance is how to achieve the right balance in their company between security and efficiency. In Part 1 of the Improving Your Security-Efficiency Balance Series, we examined the unique balancing act organizations face when it comes to user access. In this blog...
Blog

The Evolution of Cybersecurity Solutions for Organizations

In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
On-Demand Webinar

IBM i Solution Edition Program Explained

When it comes to hardware and software upgrades, don’t leave anything on the table! Know your options and then talk to your business partner, so you can see a higher return on your POWER9 investment.
Article

Backup Basics: Saving Your Data and Your Job

You need a backup strategy to test your company’s disaster recovery plan and, despite its reputation for reliability, administrators still need to back up their IBM i. A sound backup strategy should also restore individual user objects to account for human error.