Blog
The Top 11 Network Automation Examples
By Kevin Jackson on Mon, 03/27/2017
As your network grows in size and complexity, automation can free up network administrators from repetitive, manual tasks to focus on more strategic, fulfilling projects.
Article
Protect the IBM i Command Line with Powertech Command Security for IBM i
By Robin Tatam on Fri, 03/24/2017
A user’s ability to execute commands in a green-screen environment is controlled by the limit capabilities (LMTCPB) parameter on their profile. Although without exit programs to extend IBM i security functions, even limited capability users could invoke commands through network interfaces such as FTP.
Article
Command Access Can Bring Unexpected Consequences
By Robin Tatam on Fri, 03/24/2017
Does this sound familiar? You recently experienced an “unplanned outage” after an administrator inadvertently issued a PWRDWNSYS command while mentoring a new operator.
Article
Identifying Security Threats with Network Monitoring Software
By Kevin Jackson on Thu, 03/23/2017
Now more than ever, securing your infrastructure is critical to the success of your organization.
Blog
How to Go from Simple to Strategic Capacity Management
By Per Bauer on Fri, 03/17/2017
Capacity Management Strategies
If IT was like a restaurant…then capacity management should be like the restaurant manager (aka Maître D’).
Unfortunately, too many organizations are using capacity management as the clean-up department. When something goes wrong, capacity management fixes it. And while that used to work, that’s not the best...
On-Demand Webinar
10 Things You Didn’t Know You Could Monitor with Intermapper
Did you know Intermapper can monitor any device with an IP address? Learn why flexible monitoring is a must in today's dynamic IT environments.
Guide
DevOps Development: Keeping the Lights On
Overview: The DevOps methodology embodies two core philosophies: decreasing the lead time of software deployment and the automation of delivery and testing. DevOps emerged as a practical response to the agile development movement, in contrast with traditional, phase-based or “waterfall” development, which is inefficient and labor-intensive. Traditional methods should be phased out, and companies...
Blog
Capacity Planning
By Per Bauer on Tue, 03/14/2017
Have you ever experienced an online service outage? It’s like losing half your physical locations without any warning.
Downtime is a huge problem. It stops your revenue stream. It compromises customer loyalty. It damages your brand’s reputation. And it wastes hours and IT resources to fix the problem—when it shouldn’t have been a problem to begin with.
Isn’t it about time you prevented downtime?...
On-Demand Webinar
Seeing is Believing in the World of Network Mapping
In this half-hour on-demand webinar, learn how better network visibility can lead you straight to the problem device and allow you to take action before the issue spreads.
Blog
Building a Better Virus Trap
By Sandi Moore on Fri, 03/10/2017
Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.
Blog
A Virus on i?
By Sandi Moore on Thu, 03/09/2017
Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.
Blog
Three IFS Security Weaknesses You Must Secure Now
By Robin Tatam on Thu, 03/09/2017
The Integrated File System (IFS) is one of the most ignored parts of the system, yet it makes possible many of the most powerful and most used features on IBM i servers today.
Guide
Enterprise Monitoring Success
Thinner profit margins and higher customer expectations mean IT needs to up their game. Learn how enterprise monitoring can help and how to deploy a quality enterprise monitoring system successfully.
Blog
How to Choose a Capacity Planning Tool
By Per Bauer on Tue, 02/28/2017
Looking for a capacity planning tool? Find out how to choose a tool that will be the most accurate.
Article
WhatsUp Gold vs. Intermapper: Which is Right For You?
By Kevin Jackson on Sat, 02/25/2017
We compared two network monitoring heavyweights: What's Up Gold and Intermapper. Which solution reigned supreme?
Blog
Why Ease-of-Use is Critical for Simple Network Monitoring
By Kevin Jackson on Sat, 02/25/2017
Network monitoring software does not have to be overly complex to configure and operate. Intermapper is easy to use and gives you all the network analysis features you need at an affordable price.
On-Demand Webinar
An Introduction to PCI Compliance on IBM Power Systems
By Robin Tatam
Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Blog
Network Mapping Best Practices: Four Steps for Success
Wed, 02/22/2017
The process of manual network mapping can be a difficult task. Streamling the process with an industry-leading network mapping solution like Intermapper.