Resources

Case Study

Automating Crystal Reports with Automate Saves 20 Hours per Week for Appliance Distributor

For wholesale appliance distributor Echelon Home Products, generating and distributing reports for four different business divisions used to require at least 20 hours of weekly Crystal Reports work as well as wreak havoc among employees every Monday because of an all-day report-related network slowdown. That changed in 2008 when Echelon plugged into Automate, the robotic process automation (RPA)...
Case Study

Pacific Toxicology Laboratories Saves Time with Automate

Pacific Toxicology Laboratories (PacTox), located in Chatsworth, California, is a privately owned company that performs five distinct lab functions under one roof—drug testing, biological monitoring, medical surveillance, therapeutic drug monitoring, and forensic toxicology. PacTox's competitive advantage is its unique ability to provide integrated biological testing services. Clients include...
Article

Code-Free Database Automation

Watch the recorded webinar to learn how to automate tedious database interaction tasks like data entry, reading incoming data files, and more.
Blog

Your Biggest Challenge to IBM i User Onboarding

As companies bounce back from recession and place a stronger emphasis on digitally-driven innovations, IT departments are finally receiving the funds they need to hire qualified, new colleagues who can lighten the workload. However, the first order of business will be getting these recent hires up to speed.
Blog

Database Transaction Log Management

Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Blog

How DR Compliance Requirements Impact HA Decisions

Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Guide

Download “Identity & Access Management for IBM i”

Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual processes that...
On-Demand Webinar

VTL Save Strategies on IBM i

Tape-only backups are not secure. Think about it. Your organization allows third-parties to take tapes off-site for storage. Once the tapes are off-site, they’re out of your control. But there is good news.
On-Demand Webinar

Introduction to FlashCopy

Watch this webinar where IBM i expert Chuck Stupca explains how FlashCopy works and discusses the ways that it helps you build a better backup strategy for your IBM i environment.
Article

4 Reasons to Add VTLs

Backup and recovery processes are among the unsung heroes of data center operations. Though end results may not be readily apparent on an everyday basis, natural and digital disasters have a way of humbling companies that do not take this risk management discipline seriously.