Resources

On-Demand Webinar

Workshop: PowerHA + Robot HA

Watch this hands-on session and learn how to work with PowerHA and journaling software like Robot HA to verify that you’re replicating what you want replicated and that you are ready for the role swap.
On-Demand Webinar

Expert Tips for IBM i Security: Beyond the Basics

In this session, IBM i security expert Robin Tatam will provide a quick recap of IBM i security basics and guide you through some advanced cybersecurity techniques that can help you take data protection to the next level .
On-Demand Webinar

Simple Strategies for Malware Defense on IBM i - presented with COMMON

With today's advanced malware and ransomware threats, malicious programs can cause a massive business disruption. Not all organizations can recover from attack. To avoid corrupted data and downtime, you need to consider a comprehensive approach to malware defense for Power Systems servers running IBM i, AIX, and Linux. Watch this webinar to learn about advanced malware threats and simple...
On-Demand Webinar

Top 3 Reasons Why You’re Scared of Role Swaps

Your high availability solution is only as good as your ability to successfully perform a role swap. During this recorded webinar, you'll learn how Robot HA can eliminate the anxiety around role swaps and make testing a snap.
Guide

5th Annual IBM AIX Community Survey Findings

The AIX Community Survey, now in its fifth consecutive year, goes in-depth with IT teams to gain a unique perspective into how this platform is being used today and how teams envision using it in the future. Over the years, the respondents of the survey have expanded to include a variety of industries, geographies, and titles within IT. More than 100 IT professionals in North America, EMEA, and APAC participated in this year’s survey, and this input enables all of us to understand the role of AIX with new clarity.
Blog

Recommended QSECURITY Level for IBM i

The system security level (QSECURTY) sets the overall tone for your IBM i security posture. Read this blog post to learn how many organizations are following IBM's best practices.
Blog

Reduce Virus Spread with QIBM_QP0L_SCAN_OPEN and QIBM_QPWFS_FILE_SERV

The data below is taken from the 2021 State of IBM i Security Study , which provides compelling insight into the security posture of 247 IBM i servers and partitions—systems that are often used for business-critical data, payment card data, and personally identifiable information (PII). The full study can be accessed here .
Article

Eight Different Ways to Use HA at My Organization

A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.