Guide
Download “How IT Professionals Can Navigate PCI DSS Compliance” Guide
The Payment Card Industry Data Security Standard (PCI DSS) applies to every organization that processes credit or debit card information. This includes merchants and third-party service providers that store, process, or transmit credit card data.The launch of PCI DSS helped expose serious security shortcomings, failures to follow security best practices, and a...
Article
Job Schedule Security Options in Robot Schedule
By Chuck Losinski on Tue, 08/16/2016
IBM i is one of the most secure systems in the world. Don’t take that security for granted by leaving Robot Schedule vulnerable when it could be easily remediated.
Article
Get a Handle on Your Job Stream with Forecasting
By Chuck Losinski on Tue, 08/16/2016
A Robot Schedule forecast shows you the run activity scheduled for all Robot Schedule jobs over a time period that you specify. Robot Schedule uses the job schedule, job completion history, and any information you add for user jobs, remote prerequisites, and members of remote groups to make its forecast.
Article
Where to Start with IBM i Operations
By Tom Huntington on Tue, 08/16/2016
Have you recently adopted an IBM server running IBM i and don’t know where to begin with system operations? You are not alone.
Article
What’s New in the Robot NETWORK Web Interface?
By Chuck Losinski on Tue, 08/16/2016
Just when you were getting used to the GUI, Robot NETWORK gives its web interface a boost that makes managing your performance and Robot product metrics even easier.
Article
On the Trail of IBM i Audit Data
By Chuck Losinski on Tue, 08/16/2016
Believe it or not, auditors are your friends, but audit reporting might be your worst enemy. Gathering all that data can take ages, unless you’ve already keeping automated audit trails across your operations.
Blog
Tools for Modernizing IBM i Applications
By Tom Huntington on Tue, 08/16/2016
How can IBM i applications be modernized and brought in line with evolving enterprise expectations for user experience and extensibility? Much of the software for the platform still runs code from the 1990s, which is understandable given binary compatibility, but the truth is that the standard “green screen” isn’t state-of-the-art anymore.
Article
Pursuing Application Modernization to Maximize IBM i
By Tom Huntington on Tue, 08/16/2016
Even though IBM i has proven its worth for more than 30 years now, there are still numerous ways to maximize its use. Application modernization is one initiative worth pursuing to gain the most value from the operating system.
Article
Robot and FlashCopy
By Tom Huntington on Tue, 08/16/2016
Last month, Chuck Stupca (retired IBMer) and Chuck Losinski (Fortra) presented a webinar discussing FlashCopy for IBM i. Based on the attendance, it looks like this is a very important topic for many of you so I wanted to explain how FlashCopy ties to Robot products.
Blog
Is Your Team A Little Rusty on IBM i Operations?
By Tom Huntington on Mon, 08/15/2016
Let’s be honest. Finding good training for your staff and instructors who really know IBM i can be an issue. Luckily, Fortra offers essential training on IBM i operations from experts with over 20 years of experience.
Blog
What is EdTech? A Snapshot of Modern Tech in Schools
By Kevin Jackson on Fri, 08/12/2016
In 2016, technology in schools is on the rise. Read the article for a snapshot of what EdTech is and how it’s growing.
Blog
Lessons Learned from the Telstra Network Outages
By Kevin Jackson on Thu, 08/11/2016
Real-life network outages are a wake-up call to brands who aren’t taking precautionary measures. Here's what happened to Telstra customers, what Telstra did wrong, and how your business can avoid such a devastating, costly situation.
Press Release
HelpSystems (now Fortra) Fills Encryption Gap With Linoma Buy
Despite all the IBM i security vendors that Fortra has bought over the years--and there have been at least five of them--the company has lacked one key security capability valued by enterprises: encryption.
Blog
11 Things To Know About IPv6 Transitions
By Kevin Jackson on Mon, 08/01/2016
Benefit from the collective wisdom we’ve complied from IT professionals and learn a thing or two (or 11) about IPv6 transitions.
Guide
Self-Audit: Checking Assumptions at the Door
Sysadmins, devops engineers, and cybersecurity personnel are often kept awake by a number of questions.
How should I monitor my monitoring to be sure it will alert me when there is a security issue that needs my intervention? How can I be sure that the servers and processes in the environment haven’t been rooted already?
In the quest to get better sleep, it is a good idea to self-audit your...