Resources

Blog

Single Sign-On and the Dangers of Active Directory

Active Directory is a staple of enterprise IT and it nominally ensures secure, authenticated access to a company's core business applications. It can become problematic if it isn't properly monitored and supported by up-to-date security software, modern hardware, and access controls. Accordingly, system administrators face many potential risks when working with Active Directory.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Blog

IBM i: The Backbone of the Banking Industry

Highly regulated organizations such as those in the banking industry have a strong history with IBM i, and for good reason—the platform offers an unprecedented level of security.
On-Demand Webinar

10 Tips for AIX Security

Attackers often target servers used for mission-critical data, and servers running AIX are no exception. In this on-demand webinar, cybersecurity expert Robin Tatam explains how a well-defined security policy can help protect your systems, focusing on the 10 most important issues to consider for setting a strong AIX security policy.
Article

Secret Capabilities of Robot Schedule Revealed

We recently surveyed our Robot Schedule technical support group for “ah ha!” moments that they’ve helped customers realize over the past few years. These tips from our tech gurus have helped customers automate jobs that needed to check a data area before running, track non-Robot jobs for reporting purposes, and check the status of a file before running a job.
On-Demand Webinar

Next Generation Job Scheduling

Have you seen the new web interface for Robot Schedule? It contains current user favorites, including Schedule Activity Monitor (SAM), plus exclusive new features for diagraming job flows and sharing dashboards.
On-Demand Webinar

IBM i Meets Mobile Technology

According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
On-Demand Webinar

Business Process Automation with Robot

Typical “computerized” business processes are a combination of multiple schedulers, operational scripts, CL programs, and manual file checking, all backed up with the trusty runbook. Is there a better way to manage business processes? You bet!
Blog

Do You Need Enterprise Scheduling Software?

Job scheduling was simpler when you only needed to worry about your IBM i (AS400) server and its batch processes, but several dynamics have changed over the past decade which have forced us into worrying about processes on other platforms.
Article

Robot Best Practices

Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
Article

Have You Met SAM?

Isn’t it time your job scheduling environment (and your IBM i) got the modern look it deserves? Give Schedule Activity Monitor a try for graphically monitoring your jobs on the go.
Article

Interfaces with Robot Schedule

If you’re using EnterpriseOne or SAP, it may be to take a closer look at the security and business process automation that Robot Schedule can offer these key applications on IBM i. We don’t talk enough about the integration we’ve done between Robot Schedule and EnterpriseOne (formerly JD Edwards, now owned by Oracle) and SAP.