SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing unix and linux servers, and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure could easily leave your enterprise vulnerable to a breach. Are you in control?
SSH, Secure Shell protocol, is now nineteen years old and broadly deployed across...
Though methods vary between companies, the counterintuitive truth is that managers may have to be more transparent with their motives in order to accomplish the oversight they want.
As organizations become increasingly aware of the need to protect their data, the question that needs to be answered is how much security is enough? Unfortunately, that’s one of those “it depends” questions. Each organization must consider their own requirements before confidently answering that question. This document discusses those considerations.
IT personnel naturally have their fingers on the pulse of today's innovations and one eye fixed on the future. As a result, each rising generation of systems administrators and application developers seems convinced that they know better than their forefathers and can remedy all kinds of issues with new tools and tricks. Unfortunately, this appetite for innovation can cause overzealous...
Not all IBM i experts are created equal. Programmers, developers, operators, and system administrators each have a specific skillset that keeps your business running smoothly. When one resource retires, don't burden another with the additional workload. Think long-term and look to automation instead.
Robot has many built-in features that assist in providing historical audit trails for compliance and forensic needs. Watch this webinar to learn how to access them.
See how a two-pronged approach using data backups and a high availability solution could deliver the strongest disaster recovery strategy for your organization.
If your IBM i expert is looking toward retirement, you’ll want to know what IBM i skills—and salary requirements—are out there. Watch this webinar and learn how a forward-thinking data center can attract new talent.
High availability solutions are seen as expensive, time consuming, and tricky. So, even though HA tops IT wish lists, many companies pump the brakes and make excuses to delay implementation. We’re here to clear the air for HA.
See how the right development tools give you greater insight into your applications and help you deliver the level of productivity auditors and users expect.
If you’ve ever regenerated a user’s misplaced report, manually converted and emailed a report, or been told by auditors to take away *SPLCTL, watch this webinar to learn seven ways Robot Reports can help.
Your ERP decision could make or break your company, so it’s essential to get it right the first time. If you’re considering an ERP change or questioning why IBM i, watch this!
As data storage needs increase, SAN technology delivers greater flexibility. Chris Bremer, Chief Technology Officer at DSI, leads this 30-minute recorded session on what SAN is and how it works.
Tape-only backups are not secure. Think about it. Your organization allows third-parties to take tapes off-site for storage. Once the tapes are off-site, they’re out of your control. But there is good news.
Watch this webinar where IBM i expert Chuck Stupca explains how FlashCopy works and discusses the ways that it helps you build a better backup strategy for your IBM i environment.