Watch this webinar series for your FREE opportunity to learn what every user should know about Robot Monitor and Performance Navigator software for IBM i (iSeries, AS/400) monitoring, plus advanced tips and tricks.
When your core IBM i application could be going down, don’t be the last to know. Watch this recorded webinar and learn how Robot has application monitoring covered.
Data security is hard. We’re not going to sugarcoat it.
In this 60-minute webinar we'll:
Discuss the best practices for protecting your data throughout its lifecycle
Introduce our full data security suite, which provides protection from creation to publication, and sharing of your sensitive data.
Explore some common use cases that our suite...
Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
In this on-demand webinar, the automation experts from Fortra and CM First to explore ways to leverage IT automation tools in your most critical business projects—including those on IBM I, including those generated with CA 2E(Synon) and CA Plex.
Watch this webinar where our panel of technology experts discuss the reasons why many organizations are taking advantage of SAN technology for virtualization, high availability, backup management, and more.
In a time when unattended computer operations are expected, IBM i is the right platform. Watch this webinar to get the success formula for lights-out automation.
Watch this recorded webinar to learn more about Performance Navigator, the preferred software for system sizing and capacity planning on IBM’s Power Systems platform.
How well do you understand the capabilities of the underlying IBM PowerVC technology that supports this virtualization? Watch this webinar for pro tips!
During this webinar, our experts demonstrate the key features that make Robot Monitor the right choice for proactive performance monitoring across your Power Systems environment.
Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the extra time and headache required to maintain these methods – and the lack of security these methods provide.
If this sounds familiar, join us as our cybersecurity experts explain why using FTP and...
Don’t let QZDASOINIT jobs put a stranglehold on system resources while you fly blind. Get to the bottom of job performance issues faster with Robot Monitor. Watch now!
Are you confident that your Power Systems servers are set up to handle your busiest season? Watch this webinar to learn tired-and-true methodology from the experts.
Watch this recorded webinar to get a better understanding of why IBM i jobs end up where they do and what you can do to control where they go to optimize system resources.
Are you using legacy programs or unsecured processes to transfer files on the IBM i? Watch this webinar to learn how to streamline, secure, and audit your file transfers.
IT and cybersecurity teams frequently envision, create, and implement innovative uses for their secure file transfer software. These unique applications allow them to solve critical industry and organizational needs without using a secondary solution or tool!
In this informational ebook, you'll discover countless ways your peers use managed file transfer (MFT) in their organizations. We share...