Resources

On-Demand Webinar

IBM i Work Management 101

Watch this recorded webinar to get a better understanding of why IBM i jobs end up where they do and what you can do to control where they go to optimize system resources.
On-Demand Webinar

Expert Tips for Securing AIX Systems

Servers running AIX and other operating systems are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes make their attacks much easier. One of the most serious mistakes is failing to create a well-defined security policy. A written statement of how your...
Article

Take Your Work to Warp Drive!

If your mission is work management, IBM i is the best starship in the fleet. Routing certain types of work into subsystems and memory pools, separating dissimilar work, and giving jobs the appropriate CPU time—this is work management the Windows world can only dream about.
Article

Two-Way Message Response with Robot

You have the afternoon off—but not the responsibility of monitoring your system for issues. This includes responding to application and system messages as they occur on your production IBM i jobs. You don’t want to carry your laptop around just in case you need to VPN back to answer a message that is waiting on your month-end process. What option do you have?
Blog

The Pros & Cons of Network Diagrams

Do you know what devices are connected to your network? A network diagram can help you get a better sense of what's happening on your network. Check out the infographic to learn the pros and cons of network diagrams. Images Not Loading? Check out the Text Version Keeping your network up and running can seem like an uphill battle. Especially without having a full-view of the devices on your network...
Blog

Why Does EdTech Matter to a Network Admin?

As chalkboards give way to computer screens and other devices, like smartboards and tablets, it’s important to understand IT’s impact of embracing educational technology.
Datasheet

Performance Navigator

Historical performance monitoring and modeling across your IT environment In an increasingly virtualized world, it’s becoming more and more difficult to understand performance across your IT enterprise. Performance Navigator performance analysis software allows you to see what’s truly occurring on your mission critical systems. With current day and historical performance data, you know exactly...
Datasheet

Intermapper Getting Started Training Overview

The Intermapper Getting Started training program helps customers quickly apply their knowledge to easily map and monitor their environment. Intermapper from Fortra is an enterprise mapping, monitoring, and alerting tool that helps network administrators maintain healthy networks. Customers can now take advantage of our Intermapper Getting Started training program to help enable planning of...
Guide

Download "CIO Confidential: 5 Things Your IBM i Security Administrator Should Tell You"

Employees on the front lines often possess insight that manager, directors, and executives lack. Corporate leaders rely on feedback from these professionals, especially when it comes to emerging security threat. But for a variety of reasons, systems administrators might be reluctant to to speak up about critical issues related to IBM i, including the importance of consistently updating security...
On-Demand Webinar

How to Control Your Data and Stay Compliant with Robotic Process Automation

Data security is a top concern for modern businesses when choosing any new software. It’s critical to ensure your data will be kept safe and within compliance regulations when choosing vendors. Automate is a robotic process automation ( RPA ) solution that lets you automate your most repetitive tasks to make your life easier and more efficient without leaving you vulnerable. Watch our on-demand...