On-Demand Webinar
Lights-Out Automation for IBM i Data Centers
In a time when unattended computer operations are expected, IBM i is the right platform. Watch this webinar to get the success formula for lights-out automation.
Guide
Cybersecurity Insiders 2021 Malware Report
Malware and ransomware are some of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and government agencies.
The 2021 Malware Report was produced by Cybersecurity Insiders and Fortra to reveal the latest malware security trends, challenges, and investment priorities. Here are some of the findings:
More respondents see malware and...
Article
RPA in Action: Automated COVID-19 Employee Wellness Survey
By Paul Necklen on Thu, 04/02/2020
Watch this example of robotic process automation (RPA) in action and see how you can automatically send employees a COVID-19 wellness survey and track company-wide results.
Blog
7 Misconceptions About Automation
By Chuck Losinski on Tue, 03/31/2020
Don’t let fear of the unknown decide your fate. Familiarize yourself with the facts about automation before you spend another minute on manual AS400 operations.
Article
Why Relying on Scripted Operations Can Be a Problem for Your Business
By Steve Brasen on Tue, 03/31/2020
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Blog
Five Tips for the Automation Journey
By Tom Huntington on Tue, 03/31/2020
Here are five tips from Tom Huntington on how best to move your IBM i automation project along the path to success.
Blog
Common Excuses for Not Automating
By Tom Huntington on Tue, 03/31/2020
Whether it’s staffing, budget, or complexity, we’ve heard all the excuses to forgo automation. The next time you hear—or find yourself making—an excuse, have the response ready.
Blog
The Case for Storage Area Networks (SAN)
By Tom Huntington on Tue, 03/03/2020
Using storage area networks or SAN for virtualization and dynamic allocation of system resources can lower the total cost of ownership of disk and improve flexibility for backups and more. Here’s how.
Article
IBM on IASP for PowerHA Implementations
By Chuck Losinski on Tue, 03/03/2020
You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
Blog
The Difference Between BPA and Job Scheduling and When You Need Both
Thu, 02/27/2020
BPA and job scheduling aren't mutually exclusive. In fact, an enterprise may use a job scheduler to support its wider BPA strategy.
On-Demand Webinar
Is the California Consumer Privacy Act (CCPA) the Next GDPR and Why Should I Care?
In this session, you’ll learn why most organizations—not just those in California—are affected by the CCPA and what it means for IT pros.
On-Demand Webinar
Security Best Practices for the IBM i Administrator
Tue, 01/28/2020
During this webinar, you'll see a checklist of tasks that you can follow and actions you can take to ensure that you are following the best practices for security on your IBM i.
Blog
The Top 9 Microsoft Application Tasks You Should be Automating
Fri, 12/27/2019
From Outlook inboxes to Excel spreadsheets to PowerShell scripts, Microsoft is ubiquitous in the work place. Learn how to automate Microsoft application tasks.
On-Demand Webinar
A CISO’s Take on IBM i Security
By Robin Tatam
In this webinar, IBM i security expert Robin Tatam focuses on helping you change perceptions of IBM i at your organization and getting what you need from your management team.
Blog
Protecting AIX Servers Against Malware Threats
By Bob Erdman on Thu, 11/07/2019
Find out what security challenges AIX servers face, and what can be done to overcome them.
Blog
Benefits of Business Process Automation: Five Problems BPA Can Solve
Wed, 10/30/2019
You’ve heard all about business process automation and how it can save enterprises time and money. But how do you know if your business has a need for BPA software? Here are five common problems you might be facing that can easily be solved with the right automation tool
On-Demand Webinar
AS/400 Security in an IBM i World
By Robin Tatam
Learn why outdated security implementations put IBM i organizations in danger and how you can minimize the risks.
Blog
Why Should You Delete Journal Receivers?
By Tom Huntington on Thu, 10/17/2019
Excessive disk space usage causes your IBM i (iSeries, AS/400) backups and disk reporting to take longer. It's best practice to automate clean-up for your journal receivers. Here's how.
Article
Automate 11.2 Enhances RPA Functionality
Mon, 09/30/2019
Discover the latest enhancements to your robotic process automation (RPA) experience with Automate’s 11.2 release.