Resources

Datasheet

Robot Schedule Interface to EnterpriseOne

Enjoy more flexibility and control over scheduling Oracle JD Edwards EnterpriseOne jobs. With the Robot Schedule interface to EnterpriseOne, data selection is dynamic, making it a snap to schedule jobs to run unattended.
Datasheet

Robot Schedule Enterprise

Discover error-free scheduling with the most advanced IBM i job scheduler, and get industrial-strength scheduling across your IBM i-centric enterprise with Robot Schedule Enterprise.
Datasheet

Robot Replay

Robot Replay automates interactive jobs, including FTP processes. Use it to create Replay objects that mimic interactive processes—processes that you can execute automatically and unattended using Robot Schedule.
Article

Interacting with Powertech SIEM Agent for IBM i

Your organization has invested in a security information event manager, or SIEM, to receive and analyse security and event log information from a variety of servers. Now they want to also get this information from their IBM Power Systems server.
Blog

What Can You Monitor on Your Campus Network?

The better question is, what can't you monitor on campus? Intermapper provides network monitoring for your school for anything with an IP address. Check out the infographic to see examples of the possibilities. PRINT THE INFOGRAPHIC ...
Datasheet

Intermapper Getting Started Training Overview

The Intermapper Getting Started training program helps customers quickly apply their knowledge to easily map and monitor their environment. Intermapper from Fortra is an enterprise mapping, monitoring, and alerting tool that helps network administrators maintain healthy networks. Customers can now take advantage of our Intermapper Getting Started training program to help enable planning of...
Blog

3 Ways Malware Can Reach Your IFS

It's true that IBM i can't be infected by a PC virus. It's also true that the IFS can act as a host and spread malicious programs throughout your environment.
Blog

Why Corporate Networks are Key Targets for Cryptojacking

The days of being able to ignore cryptocurrency is over. Even if you don’t use it, you’re now at risk of being adversely affected by it through cryptomining malware, also known as cryptojacking. Read on to find out what cryptocurrency is, how cryptojacking is on the rise, and how you can protect your organization.