Resources

Blog

IBM i: The Backbone of the Banking Industry

Highly regulated organizations such as those in the banking industry have a strong history with IBM i, and for good reason—the platform offers an unprecedented level of security.
On-Demand Webinar

10 Tips for AIX Security

Attackers often target servers used for mission-critical data, and servers running AIX are no exception. In this on-demand webinar, cybersecurity expert Robin Tatam explains how a well-defined security policy can help protect your systems, focusing on the 10 most important issues to consider for setting a strong AIX security policy.
Blog

2 Ways Encryption Protects You Even After a Data Breach

The growing threats to data highlight the need for multiple layers of defense. Encryption is a critical layer that protects your organization from some of the most devastating consequences of a data breach.
Article

New Approaches to the SWIFT and PCI-DSS Framework

Image THE WORLD OF COMPLIANCE At the official start of summertime 2016 in Britain we are starting to consume the labour of last autumn, five gallons of alcoholic homemade cider (yum!) made from eight apple varieties grown in mine and my neighbors’ gardens. I’m very VERY careful sterilizing glassware, containers, and buckets: there...
Blog

What Can IBM i Offer IT's Young Guns?

IT personnel naturally have their fingers on the pulse of today's innovations and one eye fixed on the future. As a result, each rising generation of systems administrators and application developers seems convinced that they know better than their forefathers and can remedy all kinds of issues with new tools and tricks. Unfortunately, this appetite for innovation can cause...
On-Demand Webinar

Aging RPG Programmers in Charge of Your IBM i?

Not all IBM i experts are created equal. Programmers, developers, operators, and system administrators each have a specific skillset that keeps your business running smoothly. When one resource retires, don't burden another with the additional workload. Think long-term and look to automation instead.
Article

How Recoverable Is My IBM i?

See how a two-pronged approach using data backups and a high availability solution could deliver the strongest disaster recovery strategy for your organization.
On-Demand Webinar

Recruiting IBM i Pros in the 21st Century

If your IBM i expert is looking toward retirement, you’ll want to know what IBM i skills—and salary requirements—are out there. Watch this webinar and learn how a forward-thinking data center can attract new talent.
On-Demand Webinar

Viably IBM i for ERP

Your ERP decision could make or break your company, so it’s essential to get it right the first time. If you’re considering an ERP change or questioning why IBM i, watch this!
On-Demand Webinar

VTL Save Strategies on IBM i

Tape-only backups are not secure. Think about it. Your organization allows third-parties to take tapes off-site for storage. Once the tapes are off-site, they’re out of your control. But there is good news.
On-Demand Webinar

SCSI Is Dead, Long Live SAN

As data storage needs increase, SAN technology delivers greater flexibility. Chris Bremer, Chief Technology Officer at DSI, leads this 30-minute recorded session on what SAN is and how it works.