Have you seen the new web interface for Robot Schedule? It contains current user favorites, including Schedule Activity Monitor (SAM), plus exclusive new features for diagraming job flows and sharing dashboards.
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
Typical “computerized” business processes are a combination of multiple schedulers, operational scripts, CL programs, and manual file checking, all backed up with the trusty runbook. Is there a better way to manage business processes? You bet!
Learn best practices for message management on your IBM i, plus techniques for monitoring, tips for filtering, and tools for escalating and notifying team members of the most critical messages in a hurry.
See firsthand the flexibility that file monitoring brings to your schedule by allowing event-driven scheduling based on file creation, deletion, and file size.
Your IBM i expert can't always be there. Learn how to harness their knowledge and automate interactive processes in your green screen IBM i applications.
Could an automation tool like Robot job scheduling software for IBM i help your application development team be more productive? Yes, actually. Watch this webinar to see how.
Many considered Heartbleed the worst vulnerability ever discovered, but other malicious threats have been unleashed since the Heartbleed Bug, with a significant growth in mobile malware. Watch this webinar to learn how to protect your system.
IBM i servers face an even more likely threat than hackers: one that’s already infiltrated the advanced firewall, has engineered the capability to access critical business data, and has been operating without detection for years.
IBM i and other servers are frequent targets of cyberattacks, according to the Data Breach Investigations Report. Watch this 40-minute recorded webinar to learn how to mitigate common threats to your organization’s data.
Everyone knows that security is important, but implementing a plan for compliance and data protection can be intimidating. Watch this webinar to learn where to focus your resources and attention to make the biggest impact.
Learn how to get started with IBM i security, and how PowerTech’s Security Scan tool can perform a personalized review of your environment—in under 5 minutes!
Watch this recorded webinar, hosted by certified auditor and IBM i expert Robin Tatam, to learn about important IBM i security considerations and strengthen your data protection.