product_page
VCM Enterprise
Optimize hybrid IT and proactively assure performance across the enterprise
On-Demand Webinar
Getting Started with Your Cloud Migration
By Keith Digby
You’ve decided to migrate to the cloud, but what migration strategy will keep your costs down and be most efficient?
You have two main strategies for moving workloads to the cloud: Refactoring or Lift and Shift. Refactoring requires more time on the front end to optimize workloads prior to migrating. Lift and Shift moves eligible workloads...
On-Demand Webinar
How to Improve Your Organization's IT Maturity
By Per Bauer
IT Maturity is often associated with increased efficiency and reduced risk, two forces that will drive valuable improvements. But without a full understanding of the business objectives and how IT needs to be aligned with those full optimization is not possible. The IT Service Optimization Maturity Model will allow you to gradually improve without losing track of any important aspect.
On-Demand Webinar
Q&A with a Capacity Management Expert, Part Two
Tue, 03/06/2018
Listen to this on-demand webinar to answer questions like: Is capacity management still relevant in the cloud? Why do large companies still struggle with capacity management? Does capacity management support or hinder DevOps?
Blog
What is a Capacity Management Maturity Model?
By Per Bauer on Sat, 01/20/2018
Demands for services are increasing. High performance and reliability are expected. Yet budgets, labor and floor space are all being constrained. That’s where capacity management comes in. Capacity management can improve efficiency and guarantee reliability of your business systems.
Blog
Capacity Management in Operations Management [Webinar Recap]
Wed, 12/06/2017
Learn where capacity management fits into operations management today—especially as organizations move into the cloud.
On-Demand Webinar
What is Capacity Management?
Capacity management is the practice of ensuring you have enough IT resources to meet business demands (without overspending). But your IT environment is a lot more complex than it used to be...
Case Study
Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400
Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at...
product_sub_page
Security
Do your users have ODBC connections to your IBM i environment through tools like Microsoft Access or Microsoft Excel?
Unprotected ODBC connections make it easy for people to access unauthorized data or accidentally change and delete database records.
Surveyor/400 minimizes the risk of unauthorized access by providing connections to your IBM i data while maintaining database security and inte...
product_sub_page
Key Features
If you perform development for the IBM i, you will discover that Surveyor/400 provides a wide variety of benefits to make your job easier. Listed below is just a sample of some of the work you can easily perform using Surveyor/400:
Explore your IBM i through a drill-down tree interface similar to Windows Explorer
View extensive details on any object through an intuitive multi-tabbed panel
...
product_page
Surveyor/400
Maximize the value of your IBM i system with a graphical productivity tool
Blog
Using Field Procedures for IBM i Encryption
By Robin Tatam on Fri, 09/15/2017
Robin Tatam has fielded quite a few questions about how to encrypt IBM i data. In this quick video, he outlines your options and explains field procedures (FieldProcs).
Guide
Download "IBM i Encryption: How to Protect Your Database"
Learn your options for encrypting IBM i data.
Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property.
Encryption is widely recognized as the most effective way to ensure...
Blog
Five Causes of Performance Bottlenecks in IT
Wed, 08/09/2017
As IT infrastructures continue to grow more complex, finding performance bottlenecks gets hard. That’s why it’s absolutely essential that IT teams have the tools, training, and resources necessary to quickly identify causes of poor application performance.