Article
Monitoring the Demands of Fast Disk
By Kurt Thomas on Wed, 08/24/2016
The IT industry is decisively moving away from traditional hard disk drives (“platters”) in favor of Flash-based solid-state drives (SSDs). It’s a welcome change; it makes much more sense to circulate only electrons instead of disks of metal with electrons on them.
Article
Small but MIGHTY: Controlling the *CLS Object Type
By Kurt Thomas on Wed, 08/24/2016
While the instinct for administrators and IT managers is to always hunt down a culprit – a rogue job, an inactive journal receiver, or something else – sometimes the very building blocks of a common process, or rather the specifics that define processes, can be where the trouble at hand resides.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide
IT Centralization and Robot
This paper makes a case for IT centralization on IBM i and explains the important role automated systems management technologies like Robot have to play in centralized IT environments.
Guide
Building a Sound Investment Strategy Through Technology
Combining IBM Power Systems hardware and reliable iSeries job scheduler software is a powerful investment strategy for companies that not only improves their bottom line, but enhances customer experience.
Guide
Effective Log Management
IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Guide
13 Tips to Write Secure Applications and Boost IBM i Security
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide
Two Factor Authentication for IBM i
Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Article
Trigger Events with a File in Robot Schedule 12
By Tom Huntington on Fri, 08/19/2016
Robot Schedule version 12 makes monitoring for file events and setting them up as dependencies a very simple process.
Blog
User Interfaces: GUI vs. WUI
By Tom Huntington on Tue, 08/16/2016
You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.
Blog
What’s New in IBM i 7.2?
By Tom Huntington on Tue, 08/16/2016
May 2, 2014 marked another milestone for the IBM i OS. IBM continues to expand its technology support with its latest release, IBM i 7.2. Take a closer look at the new features you’ll want to know about.
Blog
What’s Really Faster: VTL or LTO?
By Tom Huntington on Tue, 08/16/2016
VTL can be faster than LTO if you take advantage of the virtual features, but if your backup rules stay the same, you may be disappointed. Read on.
Blog
Who's Afraid of IASPs?
By Tom Huntington on Tue, 08/16/2016
As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.
Article
High Availability and Your Enterprise Job Streams
By Tom Huntington on Tue, 08/16/2016
The concept of high availability has been on the minds of IT decision makers in the last several years. As the recent IBM Top Concerns survey revealed, comprehensive high availability is the second highest concern among IBM i users, with only keeping current skill sets coming ahead.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article
Job Schedule Security Options in Robot Schedule
By Chuck Losinski on Tue, 08/16/2016
IBM i is one of the most secure systems in the world. Don’t take that security for granted by leaving Robot Schedule vulnerable when it could be easily remediated.