Resources

Article

IBM i Cloud Security Considerations

    As you consider taking your IBM i to the cloud, cybersecurity will no doubt top your list of concerns. And for good reason. It’s important to remember that the cloud is kind of a lie. Your sensitive data is simply being sent to someone else’s server, and that server has a physical location somewhere. Just like on-prem cybersecurity, IBM i cloud security can be divided into two parts: ...
Article

Backup Basics: Saving Your Data and Your Job

You need a backup strategy to test your company’s disaster recovery plan and, despite its reputation for reliability, administrators still need to back up their IBM i. A sound backup strategy should also restore individual user objects to account for human error.
Article

Interacting with Powertech SIEM Agent for IBM i

Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Article

The Modern Alternative to Authority Adoption

There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Article

Secret Capabilities of Robot Schedule Revealed

We recently surveyed our Robot Schedule technical support group for “ah ha!” moments that they’ve helped customers realize over the past few years. These tips from our tech gurus have helped customers automate jobs that needed to check a data area before running, track non-Robot jobs for reporting purposes, and check the status of a file before running a job.
Article

What Makes the Good Morning Report So Good?

There is nothing like waking up to find the latest news delivered right to your doorstep, waiting for you on the printer, or sent to you electronically. For years, our customers have started their days reading the Good Morning report from Robot Schedule.
Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Article

Where to Start with IBM i Operations

Have you recently adopted an IBM server running IBM i and don’t know where to begin with system operations? You are not alone.
Article

Robot Best Practices

Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
Article

Is the i Ready for the Three Vs of Big Data?

The three Vs of big data are volume, velocity, and variety, but in order derive value from big data, IT departments need tools to store massive amounts of data (volume) and make sure it is always available for quick analysis (velocity).