Robot Monitor and Performance Navigator are powerhouses when it comes to performance monitoring and management. That’s why it’s essential for your team to understand how to harness their raw potential and put them to work so that nothing you deem critical slips through the cracks. Here’s your chance!
This article presents a technical review of how Performance Navigator stacks up as a replacement for IBM Performance Management for Power Systems (PM400).
Set up a website automation task using Automate, robotic process automation (RPA) software from Fortra. Download a free trial of automation software and set up a web automation task today.
Capacity planning is one of the most important things that a company will do, and yet there are still many companies that do it on the back of the envelope. Read this article and learn how to do it right.
When it comes to capacity planning for IBM i, skip the shortcuts. This article shares expert recommendations on how to avoid the most common capacity planning mistakes.
Check out IBM's new READ INTENSIVE SSDs.
This is a note to highlight some of the pros and cons - and dig a little deeper into one of the cons - of IBM's recently announced new class of solid state disk drives, "read intensive" (RI) SSDs.
The new RI-SSD comes in one flavor, a 1.86 TB drive. The new concept to wrap your head around is that the drive will "wear out" if you write...
Performance Navigator® requires an ODBC connection to connect to your IBM i system, but it does not come with your PC’s operating system. IBM has a downloadable they’ve titled Access Client Solutions, which we recommend our customers use to get that ODBC connection.
Will this product hurt the performance of my IBM i®?
You will not even notice that the product is working. The data gathering software is already part of the OS. I currently have a subscription to IBM's PM for Power service.
How is Performance Navigator compared to PM?
Glad you asked... Performance Navigator uses exactly the same input as PM for Power, Collection Services....
Protect your data and your company from internal and external threats by ensuring that your security policies on-premises and in the cloud are aligned with this checklist.
Image
“Some cloud vendors tout that systems deployed within their framework require little or no administration: You create an image with the software and applications that you want it to provide services for, spin it up in a management console, and Voila! you have an entirely new system online; with minimal cost, no hassle, little...
Media
Image
Text
In the early 1990s the Open Software Foundation formed a committee to select and standardize a new Management Platform Toolset for and from the UNIX ecosystem....
System admins need root level authority at all times, system operations staff needs periodic database and application account authority, and security admins needing to protect the environment are some of the few of the challenges of managing privilege in the enterprise server infrastructure. Read this article to learn more about Sudo alternatives.
Image
THE UNSOLVED PROBLEM
Secure, private, effective use of computers by a company (including hosted, cloud and other services as well as the company’s own systems) relies on managing access privileges.
The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master...
According to a recent KPMG report, four-fifths of executives at healthcare providers and payers say their information technology has been compromised by cyberattacks. That same report presents how the increased risk to healthcare organizations relates to the richness and uniqueness of the information that health plans, doctors and hospitals handle. Apart from typical financial...