On-Demand Webinar
Ask a Capacity Management Expert, Part One
Thu, 09/15/2016
Listen to this on-demand webinar to answer questions like: What does it take to be successful in capacity management? How do you manage capacity in the cloud? What are the common roadblocks—and how can we avoid them?
On-Demand Webinar
Capacity Management For Your Entire Infrastructure: Physical, Virtual & Cloud
By Bob Torz
Capacity Management has evolved over the last 40 years from spreadsheets and manual processes to full automation. In this webinar, TeamQuest will explain best practices in capacity management and walk through examples of predicting infrastructure requirements for your physical, virtual & cloud environments.
Guide
Health and Risk: A New Paradigm for Capacity Management
Capacity management, considered by top analyst firms to be an essential process in any large IT organization, is often so complex that in today’s accelerated business world it cannot be effectively implemented. Changing priorities, increasing complexity and scalable cloud infrastructure have made traditional models for capacity management less relevant. A new paradigm for capacity management is...
Blog
IT Risk Mitigation
By Per Bauer on Thu, 09/01/2016
It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks.
You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least.
And it's matched by skyrocketing consumer demand for and reliance on online services.
Bottom line: outages are more dangerous to a company...
Article
Does Your Robot Schedule Have Old Jobs That Never Run?
By Tom Huntington on Tue, 08/30/2016
When it comes to cleaning up these old Robot Schedule jobs, the best way is to use a SQL statement that you can run from STRSQL. This article will show you how.
Blog
Do You Need Enterprise Scheduling Software?
By Tom Huntington on Tue, 08/30/2016
Job scheduling was simpler when you only needed to worry about your IBM i (AS400) server and its batch processes, but several dynamics have changed over the past decade which have forced us into worrying about processes on other platforms.
Article
Can File Events Automatically Populate Reserved Command Variables?
By Chuck Losinski on Tue, 08/30/2016
A powerful feature of Robot Schedule file monitoring is the ability to capture the file name and path information, and use it in a file transfer, copy or delete operation, or combination of commands.
Article
File Monitoring and Other Features of Robot Schedule 12
By Chuck Losinski on Tue, 08/30/2016
Let’s say you have a bank transmission or FTP process that occurs randomly throughout the day. How do you monitor that activity? OPAL? CLP scripts? Not anymore!
Article
Automate the Un-Automatable
By Chuck Losinski on Tue, 08/30/2016
Automated job scheduling means your batch jobs run smoothly and your stress level goes down, but that’s only half the battle if you’re using labor-intensive, interactive applications that require you to fill out screens to submit a job.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Article
Trigger Events with a File in Robot Schedule 12
By Tom Huntington on Fri, 08/19/2016
Robot Schedule version 12 makes monitoring for file events and setting them up as dependencies a very simple process.
Blog
User Interfaces: GUI vs. WUI
By Tom Huntington on Tue, 08/16/2016
You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.
Blog
Who's Afraid of IASPs?
By Tom Huntington on Tue, 08/16/2016
As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.
Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article
Job Schedule Security Options in Robot Schedule
By Chuck Losinski on Tue, 08/16/2016
IBM i is one of the most secure systems in the world. Don’t take that security for granted by leaving Robot Schedule vulnerable when it could be easily remediated.
Article
Get a Handle on Your Job Stream with Forecasting
By Chuck Losinski on Tue, 08/16/2016
A Robot Schedule forecast shows you the run activity scheduled for all Robot Schedule jobs over a time period that you specify. Robot Schedule uses the job schedule, job completion history, and any information you add for user jobs, remote prerequisites, and members of remote groups to make its forecast.