Resources

Article

New Approaches to the SWIFT and PCI-DSS Framework

THE WORLD OF COMPLIANCE At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there was this unfortunate...
Article

Pros and Cons for Puppet's Configuration Management & Security

THE GOOD, THE BAD AND THE UGLY I was at the Red Hat Summit in Boston at the end of June. We had a lot of activity at our exhibitor stand, and a lot of discussions being passed on to me by our sales team I continued to have the same conversation again and again over the three days. This seems to be the year people have finished bedding down Puppet in...
Blog

Your Biggest Challenge to IBM i User Onboarding

As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
Guide

Download “Identity & Access Management for IBM i”

      Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Article

A Modern Approach to Performance Management

Using modern performance monitoring tools, you can build a successful strategy for performance management and quickly add value in your organization.
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

    The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article

Automate 7 Task Builder in Depth

Automate 7 Task Builder now supports multiple tasks within one Task Builder instance. While this has the obvious benefit of increasing the ease of use of editing and creating multiple tasks in one place we've taken it a step further and implemented a feature that many have asked for:
Article

How to Automate Backup & Restore Processes in Automate

In this article we will take a look at the importance of backing up Automate data in order to prevent data loss. We will also learn how to go about backing up remote Automate installations, performing automated backups and achieving data recovery in case data loss occurs despite the best of our efforts and precautions.
Article

Windows Azure Automation

Cloud computing, cloud storage, cloud database…we all have heard about the “cloud.” Cloud computing has gained tremendous visibility in recent years. According to research firm, Gartner, “By 2012, 80% of Fortune 1000 enterprises will be using some cloud computing services, 20% of business will own no IT assets.” In addition, small businesses are attracted to the small startup costs and lower TCO...
Article

Benefits of Web Server Management Console

Just like the desktop version of SMC, the Web SMC is a web-based interface for centralized management and administration, and allows you to graphically manage all elements of the Automate BPA Server including workflows, the Repository, users and agents. You can also access reports and calendars as well as configuring system settings and options.
Article

Using the Dashboard to Drive Your Business Performance

Today’s growing information and communication technology is altering how companies operate and move forward in a global environment. Because of the real-time nature of information being transmitted, organizations need a way to easily track up-to-the minute performance and operational statistics in order to make effective business decisions more rapidly.
Article

Working with Agent Groups in BPA Server

An Agent Group is a distinct Automate BPA Server object that contains one or more Agents within a logical group. They can be used as workflow objects in place of individual Agents to distribute conditions and tasks to multiple machines across an enterprise. The use of Agent Groups can be more convenient in situations where multiple agents need to be selected for automated execution. Instead of...
Article

Data Store Migration Utility

Data migration is the process of transferring data from one hardware or software configuration to another. It can be a standard yet crucial element of IT operations, allowing organizations the ability to maintain the integrity of important data while moving forward to face constantly changing technologies. The downside being that data migration is often times consuming and causes major disruptions as a result of downtime or application performance problems.
Article

Automate BPA Server Cross-Platform Automation

Introduction Increasing numbers of businesses require solutions to help unify their disparate computing platforms to better improve productivity. The upcoming BPA Server version 7.1.0.0 upgrade will enable organizations to create these kinds of solutions by including support for direct execution across multi-platforms. This new functionality broadens the spectrum of Automate BPA Server by...
Article

Automate BPA Server Agent Deployment

Automate BPA Server works hand-in-hand with Automate Agents in order to execute workflows and perform tasks across a network environment. The Agent's main purpose is to perform triggering, workflow, and task execution, either locally or on a remote machine.