Resources

Article

High Availability Fail Tales (and How to Avoid Them)

Chasing a high availability state is a common goal for IBM i administrators and one that can be thwarted by a single issue left unattended. By sharing some of the most frequent tales of what went wrong from real-world environments, you’ll be able to avoid these same scenarios.
Article

Monitoring the Demands of Fast Disk

The IT industry is decisively moving away from traditional hard disk drives (“platters”) in favor of Flash-based solid-state drives (SSDs). It’s a welcome change; it makes much more sense to circulate only electrons instead of disks of metal with electrons on them.
Article

Small but MIGHTY: Controlling the *CLS Object Type

While the instinct for administrators and IT managers is to always hunt down a culprit – a rogue job, an inactive journal receiver, or something else – sometimes the very building blocks of a common process, or rather the specifics that define processes, can be where the trouble at hand resides.
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Blog

Concerns in Creating a Paperless Office

Identified as a key trend of the future and a way to improve business efficiency, the idea of a “paperless” office (or more realistically, a “less paper” office) is spreading relatively slowly. Why is that?
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

    The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Guide

Self-Audit: Checking Assumptions at the Door

Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions. How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already? In the quest to get better sleep, it is a good idea to self-audit your...
Article

Dealing with Temporary Files in WebDocs iSeries

WebDocs iSeries uses the IFS directory /RJSTEMP and the library RJSTEMP to store information and files temporarily. In general, it will attempt to clean up after itself, but there are situations which arise that do not perform clean up operations. As a result, files will gradually accumulate, taking up disk that could otherwise be used for other processes. The RJSTEMP library The RJSTEMP isn’t...
Article

Advanced Troubleshooting in WebDocs iSeries

As a WebDocs iSeries administrator, if something goes wrong your users will look to you to find, and fix, the matter. Simply knowing where to look when an initial error message is unclear can resolve a huge percentage of difficulties.
Blog

3 Ways Digital Document Management Helps Financial Institutions

Secure document management is an important consideration for any business, but for financial instutions in particular, keeping data secure is critical to keeping business running smoothly and clients happy. Learn how digital document management gives financial instutions the competitive edge they need to succeed.
Blog

Document Automation: The Best of Both Worlds

Using automation software with your existing document management solution can further streamline complicated or redundant business processes and maximize productivity across your company.