Article
What's New in Automate
Mon, 10/16/2023
That latest version of Automate has just been released. Find out more about what's new!
Article
Top Three Reasons Mobile Data Access Will Be Your Savior
Tue, 11/22/2022
In today’s business world, you need data access beyond the green screen and GUI. Read this article to learn how mobile data access in a friendly browser interface will save you.
On-Demand Webinar
Strike First: Strengthen Your IBM i Security Against Ransomware
By Sandi Moore
Don’t give cybercriminals the upper hand— watch this webinar to learn how to strengthen your IBM i security against ransomware
Case Study
Summit Credit Union Transforms Mortgage Department with RPA
Summit Credit Union turned to mortgage process automation from Automate to connect Blend and Mortgage Cadence to achieve a streamlined mortgage application process.
On-Demand Webinar
Combatting Ransomware on IBM i
By Sandi Moore
Join this webinar to learn how to create an effective strategy for ransomware prevention.
On-Demand Webinar
Make the Most of Sequel with Browser-Based Data Access
You already know and love the flexibility of Sequel Data Access. You can run queries on the fly, create top-notch reports, and build dashboards your users love.
On-Demand Webinar
2021 Business Intelligence Week
Watch this webinar series for your FREE opportunity to learn what every user should know about Sequel Data Access, plus advanced tips and tricks for improved IBM i (iSeries, AS/400) business intelligence.
On-Demand Webinar
Mobilize Your IBM i Data in a Browser
With Sequel Web Interface, users get the benefit of up-to-the-minute data access in a comfortable environment: the browser. Watch this webinar to learn more!
Article
Optimizing Containers, Kubernetes and OpenShift
By Per Bauer on Thu, 09/30/2021
The container deployment model offers component autonomy, elasticity, and scalability in a way that no other framework has done before. But to reap the benefits, you need to adopt new ways of managing and optimizing your environments and their underlying resources. Learn how to manage the performance and resource planning of container workloads.
On-Demand Webinar
Protecting Power Servers from Ransomware: How and Why
By Sandi Moore
Learn how malware and viruses have successfully infiltrated Linux, AIX, and IBM i systems and get expert tips for protecting your servers.
On-Demand Webinar
Simple Strategies for Malware Defense on IBM i - presented with COMMON
By Robin Tatam
With today's advanced malware and ransomware threats, malicious programs can cause a massive business disruption. Not all organizations can recover from attack. To avoid corrupted data and downtime, you need to consider a comprehensive approach to malware defense for Power Systems servers running IBM i, AIX, and Linux.
Watch this webinar to learn about advanced malware threats and simple...
Blog
15 Business Process Automation Examples
Sun, 11/29/2020
Read these 15 top business process automation (BPA) examples and see how your organization can streamline mission-critical processes.
Datasheet
Sequel Web Interface
Make real-time business decisions, wherever you are, with Sequel Web Interface.
Datasheet
VCM Enterprise
VCM Enterprise allows you to get insight into your hybrid IT infrastructure, plan accurately for future needs, and prevent problems before they occur.
Guide
How to Do IT Cost Optimization
Our years of experience shows that organizations waste 30% of their hybrid IT spend, on average. This article identifies the five key components of a cost optimization strategy and how to be successful with each of them.
On-Demand Webinar
How to Protect IBM i from the New Malware Threats of 2020
By Sandi Moore
IBM i has never been immune to malware—but threats to businesses are greater than ever. Watch this webinar to learn how to keep your systems up and running.