On-Demand Webinar
IBM i Roundtable: High Availability Hot Topics
Are you doing everything you can to protect your organization’s data? Our expert panel discusses high availability considerations for today’s security concerns and more in this recorded webinar.
Blog
IT Maturity
By Per Bauer on Fri, 06/16/2017
What are your optimization goals?
An optimization initiative is typically triggered by one of the drivers listed below and the focus is dictated by your overall business objectives. But singlehandedly focusing on one objective may negatively impact your capabilities in the other areas. This can reduce the overall service quality and offer limited to no real value. In order to achieve concurrent...
On-Demand Webinar
How to Drive Business Value with Capacity Management
By Per Bauer
Today’s businesses—and IT environments—are complex. Technology is changing rapidly, which makes it all the more difficult to manage. You may have considered capacity management to right-size your IT environment. But you might be wondering, “What do I get out of this?” Find out how capacity management will have an impact on your bottom line (and beyond).
On-Demand Webinar
How to Control Your Cloud Deployment
By Per Bauer
Watch this on-demand webinar to learn why cloud deployments are more expensive than expected, what is contributing tot he high cost of cloud and how to gain control and optimize your cloud deployment.
On-Demand Webinar
IBM i High Availability at Fortra
Fortra has the fastest, easiest, most affordable way for you to achieve IBM i high availability or roll out DRaaS at your organization. See how!
Blog
How to Go from Simple to Strategic Capacity Management
By Per Bauer on Fri, 03/17/2017
Capacity Management Strategies
If IT was like a restaurant…then capacity management should be like the restaurant manager (aka Maître D’).
Unfortunately, too many organizations are using capacity management as the clean-up department. When something goes wrong, capacity management fixes it. And while that used to work, that’s not the best...
Guide
DevOps Development: Keeping the Lights On
Overview: The DevOps methodology embodies two core philosophies: decreasing the lead time of software deployment and the automation of delivery and testing. DevOps emerged as a practical response to the agile development movement, in contrast with traditional, phase-based or “waterfall” development, which is inefficient and labor-intensive. Traditional methods should be phased out, and companies...
Blog
Capacity Planning
By Per Bauer on Tue, 03/14/2017
Have you ever experienced an online service outage? It’s like losing half your physical locations without any warning.
Downtime is a huge problem. It stops your revenue stream. It compromises customer loyalty. It damages your brand’s reputation. And it wastes hours and IT resources to fix the problem—when it shouldn’t have been a problem to begin with.
Isn’t it about time you prevented downtime?...
Guide
Powertech Password Self Help for IBM i: Self-Service Password Reset
Resetting disabled passwords is an inevitable activity. Read this guide to find out you can reduce password management costs and increase efficiency with an easy-to-use tool that allows IBM i users to reset their own passwords.
On-Demand Webinar
Disaster-Proof Your IBM i Data
Learn the essentials to address today’s top backup and recovery concerns on IBM i from leading disaster recovery expert Debbie Saugen.
Blog
How DR Compliance Requirements Impact HA Decisions
By Tom Huntington on Wed, 03/01/2017
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Blog
How to Choose a Capacity Planning Tool
By Per Bauer on Tue, 02/28/2017
Looking for a capacity planning tool? Find out how to choose a tool that will be the most accurate.
Article
How Recoverable Is My IBM i?
By Tom Huntington on Thu, 02/09/2017
See how a two-pronged approach using data backups and a high availability solution could deliver the strongest disaster recovery strategy for your organization.
Guide
Download “Identity & Access Management for IBM i”
Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs.
So, how do you ensure users have only the access they need without overburdening IT with manual processes that...