Being a cybersecurity professional means you’re regularly in charge of making complex decisions with real-world consequences, like choosing the right cybersecurity benchmarks, controls, frameworks, or best practices for your organization. Should you apply the CIS Controls, the NIST Cybersecurity Framework, or something else? Without overarching industry consensus, it can be...
Ethical hacking has become one of the most powerful tools for preventing cyber threats. Kyle Gaertner spoke with The AI Journal about the tool's importance.
You’ve heard about IASP technology many times over the years, but you’ve been ignoring it, haven’t you? Steve Finnes confirms that it’s past time we “get to know it, understand it, and not be afraid of it.”
Don’t wait for a critical iSeries storage issue to catch you off-guard. Instead, follow these top three tips for using Robot Space to manage your disk space automatically.
The operations team was excited to share how Robot job scheduling and monitoring software has helped them manage their processing needs across platforms from their IBM i.
Intermapper 6.1 makes detecting new devices easier, more accurate, and faster than ever. Get a full review of Intermapper 6.1’s features and how to try them out.
Last month, Chuck Stupca (retired IBMer) and Chuck Losinski (Fortra) presented a webinar discussing FlashCopy for IBM i. Based on the attendance, it looks like this is a very important topic for many of you so I wanted to explain how FlashCopy ties to Robot products.
Wondering about best practices for automating your IBM i processes with Robot systems management solutions? Take a look at this list and get off to a good start.
The three Vs of big data are volume, velocity, and variety, but in order derive value from big data, IT departments need tools to store massive amounts of data (volume) and make sure it is always available for quick analysis (velocity).