Resources

Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
Blog

Looking for a Cron Replacement? Search No Longer.

Crontab scheduling simply can’t support a growing and changing enterprise. Read on to find out how to seamlessly replace cron with enterprise job scheduling software—and never look back.
On-Demand Webinar

IBM i Meets Mobile Technology

According to the 2015 IBM i Marketplace Survey, mobile access to IBM i data ranks among the top five IT concerns for the near future. Robot is here to make your mobile initiative easier.
On-Demand Webinar

Job Scheduling: Basic to Advanced

Fortra offers two automation platforms to handle the complex scheduling needs of modern enterprises: AutoMate and Skybot. Join this live webinar to learn about using these solutions to orchestrate processes from the server down to the user’s desktop.
On-Demand Webinar

Practical Task Scheduling Deployment

One of the best things about the UNIX environment (aside from being stable and efficient) is the vast array of software tools available to help you do your job. Traditionally, a UNIX tool does only one thing, but does that one thing very well. For example, grep is very easy to use and can search vast amounts of data quickly. The find tool can find a particular file or files based on all kinds of...
Blog

Job Scheduling: Basic to Advanced (Webinar Recap)

As IT environments become increasingly complex, so do a business's job scheduling needs. Learn how Fortra job scheduling and robotic process automation solutions can help you streamline your unique IT processes.
Guide

Controlling SQL Updates Using Powertech Exit Point Manager for IBM i

Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data. However, allowing a user to view, update, and even delete data without any control by the...
Blog

IT Security Compliance 101

In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Guide

13 Tips to Write Secure Applications and Boost IBM i Security

Barely a day passes without new headlines reporting another cyber attack, policy violation, or data breach. Secretly, we breathe a sigh of relief that it happened to someone else, but most of us know that we’ll all eventually feel the impact in some capacity.
Blog

User Interfaces: GUI vs. WUI

You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.