Resources

Article

Virtual Tape Considerations for IBM i

This article examines some of the most popular IBM VTL (virtual tap library) solutions for IBM i and other platforms. You'll also learn what to consider to determine if VTL is right for you.
Datasheet

Fortra Cybersecurity

Chances are, your team is struggling to keep up with the ever-growing workload, increasing security threats, and shifting priorities that have become hallmarks of today’s IT environment. Instead of proactively building your security posture, you’re forced to be reactive, always fighting the biggest fire first. You need a better way. It’s time to protect your organization with proactive, automated...
Article

Eight Different Ways to Use HA at My Organization

A flexible, affordable high availability solution can do more for your organization than provide business continuity after a disaster. Discover the many ways HA can help you avoid downtime and keep your data and applications accessible to end users.
On-Demand Webinar

Jumpstart Your Cost Optimization Project

When exciting new services get underway, IT can be reduced to a cost center. In an effort to keep services up, leadership adopts a “performance at any cost” mindset and allocates more resources than necessary as an insurance policy against downtime. But this is not a sustainable strategy, and especially in times like these, your organization needs to focus on controlling costs in every area of...
Blog

What Is NVMe?

NVMe is a communications interface plus high-performance protocol for accessing non-volatile memory. Learn more here.
Guide

Robot in Modern IBM i Environments

Robot systems management solutions can improve processes and enhance the return on investment for new technologies running in modern IBM i environments. Find out how.
Blog

Realize ROI with Robot

Robot has a reputation for providing high-quality systems management software and backing it up with great support. These additional benefits can help you justify the cost of automation at your company.
Blog

Five Steps for Successful IBM i Role Swaps

Your high availability solution is only as solid as your role swaps. You can’t be certain that your systems are switch-ready unless you test. Follow these steps to start testing your role swaps regularly.
On-Demand Webinar

5 Myths About Encryption on IBM i

In this live webinar, IBM i security expert Sandi Moore breaks down some of the most common (and persistent!) myths that stop IT pros from implementing encryption on IBM i.
On-Demand Webinar

Encryption on IBM i Simplified

DB2 Field Procedures (FieldProcs) were introduced in V7R1 and have greatly simplified encryption, often without requiring any application changes. Now you can quickly encrypt sensitive data on the IBM i.
Datasheet

Migrate, Run, and Recover IBM i Applications in the Cloud

Businesses in every industry are under increasing pressure to modernize their mission-critical workloads. What’s more, these updates to core infrastructure and architecture need to be carried out with minimal downtime to avoid loss. There has never been a cloud solution that uniquely supports migrating and running IBM i applications in the public cloud with high availability and disaster recovery....