Resources

On-Demand Webinar

Simple Strategies for Malware Defense on IBM i - presented with COMMON

  With today's advanced malware and ransomware threats, malicious programs can cause a massive business disruption. Not all organizations can recover from attack. To avoid corrupted data and downtime, you need to consider a comprehensive approach to malware defense for Power Systems servers running IBM i, AIX, and Linux. Watch this webinar to learn about advanced malware threats and simple...
Article

Comparing Different Methods for Calculating Health and Risk

How do you calculate IT health and risk? There are different methods you can use, depending on your needs. The most common methods for determining IT infrastructure health are: Threshold comparison Enhanced threshold comparison Event detection Variation from normal Allocation comparison Queuing theory for health On the other hand, the most common methods for calculating IT infrastructure...
Article

A Roadmap for Consolidation

There are five key steps when planning a consolidation strategy. Considerations for each step are outlined below.
Datasheet

Powertech Antivirus for IBM i

Native Protection for IBM i Powertech Antivirus for IBM i offers the power and protection of the Trellix (McAfee) scan engine, while supporting the integrated scan features of your IBM i. Recursive links, system values, and file-level scan settings are natural ground for the deep OS integration of Powertech Antivirus. Powertech Antivirus protects your IBM i data from viruses, ransomware, worms,...
Blog

Performance Management

What is Performance Management? IT performance management is responsible for everyday aspects of capacity management, like monitoring performance and resources, planning changes to make efficient use of resources, analyzing performance, and reporting back to the business.     Now more than ever, your company’s bottom line rests on your ability to provide 24/7 service...
Blog

IT Maturity

What are your optimization goals? An optimization initiative is typically triggered by one of the drivers listed below and the focus is dictated by your overall business objectives. But singlehandedly focusing on one objective may negatively impact your capabilities in the other areas. This can reduce the overall service quality and offer limited to no real value. In order to achieve concurrent...
Blog

How to Go from Simple to Strategic Capacity Management

  Capacity Management Strategies If IT was like a restaurant…then capacity management should be like the restaurant manager (aka Maître D’). Unfortunately, too many organizations are using capacity management as the clean-up department. When something goes wrong, capacity management fixes it. And while that used to work, that’s not the best practice...
Blog

Capacity Planning

Have you ever experienced an online service outage? It’s like losing half your physical locations without any warning. Downtime is a huge problem. It stops your revenue stream. It compromises customer loyalty. It damages your brand’s reputation. And it wastes hours and IT resources to fix the problem—when it shouldn’t have been a problem to begin with. Isn’t it about time you prevented downtime?...
Blog

A Virus on i?

Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Guide

Anti Malware for Linux, AIX, and IBM i Servers

When Malware Attacks Your IBM i, AIX, and Linux Servers Guide Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done. This guide examines the real-world...
Blog

IT Risk Mitigation

It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks. You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least.  And it's matched by skyrocketing consumer demand for and reliance on online services. Bottom line: outages are more dangerous to a company...