Resources

Article

Automate the Un-Automatable

Automated job scheduling means your batch jobs run smoothly and your stress level goes down, but that’s only half the battle if you’re using labor-intensive, interactive applications that require you to fill out screens to submit a job.
Article

Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i

In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Blog

Three Reasons You Need an Updated Security Policy

If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Article

Improve Event Auditing Using the System Audit Journal

With any security implementation, established rules become less effective as time passes. Because your security requirements and your systems aren’t static, you must continually audit and adapt your security plan to stay current. Be aware that your system is constantly changing.
Blog

User Interfaces: GUI vs. WUI

You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.
Blog

Who's Afraid of IASPs?

As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.
Article

Get a Handle on Your Job Stream with Forecasting

A Robot Schedule forecast shows you the run activity scheduled for all Robot Schedule jobs over a time period that you specify. Robot Schedule uses the job schedule, job completion history, and any information you add for user jobs, remote prerequisites, and members of remote groups to make its forecast.
Article

Robot and FlashCopy

Last month, Chuck Stupca (retired IBMer) and Chuck Losinski (Fortra) presented a webinar discussing FlashCopy for IBM i. Based on the attendance, it looks like this is a very important topic for many of you so I wanted to explain how FlashCopy ties to Robot products.
Article

Robot Best Practices

Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
Article

Don’t Be Exposed In *PUBLIC!

Security typically operates so that users who are not granted authority have no authority. IBM i security, however, has a unique concept known as *PUBLIC.
Article

What's New for Security in IBM i 7.1

IBM added additional security functions in version 7.1 to further establish the Power Systems IBM i operating system as a world-class securable environment.
Article

Have You Met SAM?

Isn’t it time your job scheduling environment (and your IBM i) got the modern look it deserves? Give Schedule Activity Monitor a try for graphically monitoring your jobs on the go.
Article

Interfaces with Robot Schedule

If you’re using EnterpriseOne or SAP, it may be to take a closer look at the security and business process automation that Robot Schedule can offer these key applications on IBM i. We don’t talk enough about the integration we’ve done between Robot Schedule and EnterpriseOne (formerly JD Edwards, now owned by Oracle) and SAP.