Have you seen the new web interface for Robot Schedule? It contains current user favorites, including Schedule Activity Monitor (SAM), plus exclusive new features for diagraming job flows and sharing dashboards.
According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
Typical “computerized” business processes are a combination of multiple schedulers, operational scripts, CL programs, and manual file checking, all backed up with the trusty runbook. Is there a better way to manage business processes? You bet!
See firsthand the flexibility that file monitoring brings to your schedule by allowing event-driven scheduling based on file creation, deletion, and file size.
Your IBM i expert can't always be there. Learn how to harness their knowledge and automate interactive processes in your green screen IBM i applications.
Could an automation tool like Robot job scheduling software for IBM i help your application development team be more productive? Yes, actually. Watch this webinar to see how.
When it comes to cleaning up these old Robot Schedule jobs, the best way is to use a SQL statement that you can run from STRSQL. This article will show you how.
Job scheduling was simpler when you only needed to worry about your IBM i (AS400) server and its batch processes, but several dynamics have changed over the past decade which have forced us into worrying about processes on other platforms.
A powerful feature of Robot Schedule file monitoring is the ability to capture the file name and path information, and use it in a file transfer, copy or delete operation, or combination of commands.
Let’s say you have a bank transmission or FTP process that occurs randomly throughout the day. How do you monitor that activity? OPAL? CLP scripts? Not anymore!
Automated job scheduling means your batch jobs run smoothly and your stress level goes down, but that’s only half the battle if you’re using labor-intensive, interactive applications that require you to fill out screens to submit a job.
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
IBM’s customers are turning to Power VM virtualization to consolidate multiple workloads onto fewer systems increasing server utilization and reducing cost. However a virtualized server landscape on several different IBM platforms (IBM Power Systems™, IBM System x®, and IBM BladeCenter®) may reduce hardware complexity but this puts a strain on supporting the entire lifecycle of analysis,...
Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Organizations facing a more advanced threat landscape and a complex regulatory environment require a solution which addresses the need for securely controlling access to existing systems and applications. In addition, this solution should not increase the workload on support, application providers or the end user.
You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.
As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.