Resources

On-Demand Webinar

SCSI Is Dead, Long Live SAN

As data storage needs increase, SAN technology delivers greater flexibility. Chris Bremer, Chief Technology Officer at DSI, leads this 30-minute recorded session on what SAN is and how it works.
On-Demand Webinar

Quick and Easy IBM i Disk Space Management

Studies show that the amount of data stored worldwide will grow by 4,300% within 7 years. 80% of that growth is on enterprise servers like your IBM i. If you want to be prepared to manage that kind of big data, watch this webinar!
Case Study

Halcyon Helps Computacenter Deliver Efficient Managed Services

Computacenter is Europe’s leading independent provider of IT infrastructure services. They offer consulting services as well as implementation and operation services for networks and data center infrastructures on or off client premises and in the cloud. ...
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

Effective Log Management

IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Guide

Two Factor Authentication for IBM i

Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
Blog

Who's Afraid of IASPs?

As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

    The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article

Robot and FlashCopy

Last month, Chuck Stupca (retired IBMer) and Chuck Losinski (Fortra) presented a webinar discussing FlashCopy for IBM i. Based on the attendance, it looks like this is a very important topic for many of you so I wanted to explain how FlashCopy ties to Robot products.