System administrators need more control and less complexity. This guide helps to identify the tools they need to be more effective at managing their enterprise.
The topic of this white paper is specifically around the advantages of automating one of the last bastions of manual, hands-on management—the operation and maintenance of IT platforms, systems, networks and architectures.
IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.
As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.
The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and...
IBM i is one of the most secure systems in the world. Don’t take that security for granted by leaving Robot Schedule vulnerable when it could be easily remediated.
A Robot Schedule forecast shows you the run activity scheduled for all Robot Schedule jobs over a time period that you specify. Robot Schedule uses the job schedule, job completion history, and any information you add for user jobs, remote prerequisites, and members of remote groups to make its forecast.
A new book on CIOs should put ‘the cat among the pigeons’ and create some interesting debate amongst IT professionals, particularly about risk taking and tough management decisions.
Last month, Chuck Stupca (retired IBMer) and Chuck Losinski (Fortra) presented a webinar discussing FlashCopy for IBM i. Based on the attendance, it looks like this is a very important topic for many of you so I wanted to explain how FlashCopy ties to Robot products.
Despite all the IBM i security vendors that Fortra has bought over the years--and there have been at least five of them--the company has lacked one key security capability valued by enterprises: encryption.
Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
Isn’t it time your job scheduling environment (and your IBM i) got the modern look it deserves? Give Schedule Activity Monitor a try for graphically monitoring your jobs on the go.