Watch this webinar to learn why companies aren't role swapping and how simple role swaps can be with Robot HA’s intuitive technology and dedicated services team.
Nowadays, the modern ACS is the go-to tool for many. But what are its capabilities? What is included? And how can system administrators leverage it? Watch this webinar on April 30th to learn more about how Access Client Solutions (ACS) can assist in system administration.
Our IBM i experts discuss the drawbacks of manual IBM i processing and how Fortra’s Robot Schedule makes automating your IBM i intuitive and effective.
Watch this webinar on how to tackle the two faces of SQL on IBM i. We demonstrate how you can both monitor SQL activity on your system while also creating user-defined SQL statements to retrieve and monitor nearly anything automatically for unlimited flexibility.
If you've inherited an IBM i and are unfamiliar with the platform, watch this recorded session where our experts share proven strategies for your successful education in IBM i systems management.
Watch as IBM i experts Tom Huntington and Chuck Losinski discuss best practices for message management on your IBM i. They’ll break down each step in the process and provide you with a range of message management options.
IBM stopped supporting the critical RUNRMTCMD due to security concerns. Watch this recorded session where our experts reveal how Robot Schedule Enterprise replaces RUNRMTCMD safely and securely.
Stay ahead of the IBM i curve and watch this webinar to understand the recent IBM market trends and technology launches and how they affect your IBM i.
Unfortunately, the bad news about data breaches, cybersecurity scams, and email attacks is constant and the numbers are more staggering with each year. Learn which steps to take NOW to protect your organization’s email ecosystem, such as collecting threat intelligence, mitigating against brand impersonation, and training your employees on security awareness, all while maintaining compliance.
...
Discover how you can optimize your IBM i performance by improving the storage of your IBM i data, monitoring of performance data, and analysis of historical data to optimize performance and capacity planning.
Spend 30 minutes with us and see how a legacy high availability solution that makes your job difficult can be replaced with one that is simple, safe, and cost-effective.
Email threats are constant and remain a highly sought-after opportunity for data theft. Alyn Hockey, Vice President of Product Management, discusses the top mistakes made in email security, the problems they cause, and how to fix these mistakes.
During this webinar, Peter Graves joins IBM Power Champion Tom Huntington to share top planning tips, hardware and software prerequisites, and post-installation requirements—your upgrade isn’t complete until this last step is done!
Watch this webinar series for your FREE opportunity to learn what every beginner should know about Robot Schedule software for IBM i (iSeries, AS/400) automation, plus tips and tricks for the veterans.
Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay vigilant. On top of protecting your data, it needs to be compliant which can be a daunting task - especially if your business transcends geographical boarders. Some of the most impactful regulations are General Data Protection Regulation (GDPR) and...