Resources

On-Demand Webinar

How to Drive Business Value with Capacity Management

Today’s businesses—and IT environments—are complex. Technology is changing rapidly, which makes it all the more difficult to manage. You may have considered capacity management to right-size your IT environment. But you might be wondering, “What do I get out of this?” Find out how capacity management will have an impact on your bottom line (and beyond).
On-Demand Webinar

How to Control Your Cloud Deployment

Watch this on-demand webinar to learn why cloud deployments are more expensive than expected, what is contributing tot he high cost of cloud and how to gain control and optimize your cloud deployment.
On-Demand Webinar

Modern IBM i Tools for Modern IT Teams

Every IT team has a fresh face or bright star that could revitalize and revolutionize the way IT adds value to the business. But are you giving them the tools they need to succeed? Discover modern tools to help your IT team make an impact at this recorded webinar.
On-Demand Webinar

Monitor VIOS (and AIX) from Your IBM i

With more organizations running AIX/VIOS and IBM i on the same Power server, you need better visibility. Watch this webinar to see how Robot Monitor is your single solution for real-time monitoring, notification, and reporting for AIX, VIOS, and IBM i.
Guide

DevOps Development: Keeping the Lights On

Overview: The DevOps methodology embodies two core philosophies: decreasing the lead time of software deployment and the automation of delivery and testing. DevOps emerged as a practical response to the agile development movement, in contrast with traditional, phase-based or “waterfall” development, which is inefficient and labor-intensive. Traditional methods should be phased out, and companies...
Guide

Essentials for Privileged Access Management

Learn how you can effectively and efficiently control privileged UNIX and Linux accounts from accessing data or executing any application by using centralized access management.
Guide

Controlling SSH for Security and Compliance

SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control? SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across...
On-Demand Webinar

Aging RPG Programmers in Charge of Your IBM i?

Not all IBM i experts are created equal. Programmers, developers, operators, and system administrators each have a specific skillset that keeps your business running smoothly. When one resource retires, don't burden another with the additional workload. Think long-term and look to automation instead.
On-Demand Webinar

IBM i System and Audit Reporting

Robot has many built-in features that assist in providing historical audit trails for compliance and forensic needs. Watch this webinar to learn how to access them.
On-Demand Webinar

Recruiting IBM i Pros in the 21st Century

If your IBM i expert is looking toward retirement, you’ll want to know what IBM i skills—and salary requirements—are out there. Watch this webinar and learn how a forward-thinking data center can attract new talent.