Resources

Blog

Building a Better Virus Trap

Not so long ago, viruses were just one of those little annoyances that come along with using a computer, akin to the gnat that orbits your head at the family picnic.
Blog

A Virus on i?

Do you all remember Malcom Haines’ presentation comparing the viruses on Windows and on IBM i? The first slide, for Microsoft, was an entire page filled, at a 4-point font, with different viruses. Then Malcom switched to the IBM i slide, which was blank. This would always result in an outburst in laughter among us IBM i evangelists.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Guide

Anti Malware for Linux, AIX, and IBM i Servers

When Malware Attacks Your IBM i, AIX, and Linux Servers Guide Malware and ransomware attacks have increased, halting day-to-day operations and bringing organizations to their knees. Businesses know anti malware is essential to protecting PCs from malicious programs, but many don’t realize the value of server-level protection until the damage is done. This guide examines the real-world consequences...
Guide

Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide

The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data. The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a general lack of awareness of the...
Article

Automate 7 Task Builder in Depth

Automate 7 Task Builder now supports multiple tasks within one Task Builder instance. While this has the obvious benefit of increasing the ease of use of editing and creating multiple tasks in one place we've taken it a step further and implemented a feature that many have asked for:
Article

How to Automate Backup & Restore Processes in Automate

In this article we will take a look at the importance of backing up Automate data in order to prevent data loss. We will also learn how to go about backing up remote Automate installations, performing automated backups and achieving data recovery in case data loss occurs despite the best of our efforts and precautions.
Article

Windows Azure Automation

Cloud computing, cloud storage, cloud database…we all have heard about the “cloud.” Cloud computing has gained tremendous visibility in recent years. According to research firm, Gartner, “By 2012, 80% of Fortune 1000 enterprises will be using some cloud computing services, 20% of business will own no IT assets.” In addition, small businesses are attracted to the small startup costs and lower TCO...
Article

Benefits of Web Server Management Console

Just like the desktop version of SMC, the Web SMC is a web-based interface for centralized management and administration, and allows you to graphically manage all elements of the Automate BPA Server including workflows, the Repository, users and agents. You can also access reports and calendars as well as configuring system settings and options.
Article

Working with Agent Groups in BPA Server

An Agent Group is a distinct Automate BPA Server object that contains one or more Agents within a logical group. They can be used as workflow objects in place of individual Agents to distribute conditions and tasks to multiple machines across an enterprise. The use of Agent Groups can be more convenient in situations where multiple agents need to be selected for automated execution. Instead of...
Article

Data Store Migration Utility

Data migration is the process of transferring data from one hardware or software configuration to another. It can be a standard yet crucial element of IT operations, allowing organizations the ability to maintain the integrity of important data while moving forward to face constantly changing technologies. The downside being that data migration is often times consuming and causes major disruptions as a result of downtime or application performance problems.
Article

Using Automate to Perform Desktop Interactions

Automate includes numerous interactivity related actions that can impersonate any mouse or keyboard activity as well as virtually any form of desktop interactions performed manually. This article will describe some of the more commonly used Interactivity actions and how they are used to navigate and interact with interfaces as well as supply possible solutions to some frequent interactivity and navigation related problems.
Article

Automate BPA Server Agent Deployment

Automate BPA Server works hand-in-hand with Automate Agents in order to execute workflows and perform tasks across a network environment. The Agent's main purpose is to perform triggering, workflow, and task execution, either locally or on a remote machine.