-
Alan Jordan |
Greg J. Schmidt
Datasheet
Powertech RSA SecurID Agent for IBM i
SecurID Agent brings the full functionality of the market-leading RSA SecurID two-factor authentication solution to IBM i users. Check out the datasheet to learn more.
Article
What's New in Automate
Mon, 10/16/2023
That latest version of Automate has just been released. Find out more about what's new!
Article
The Importance of VIOS
Thu, 08/31/2023
VIOS is considered a standard in organizations running IBM i, AIX, and Linux workloads. But don’t put your business at risk by letting it run unchecked. Learn five areas you must be monitoring.
On-Demand Webinar
How to Merge Data from Different Sources
By Alan Jordan
Watch this recorded session on how Sequel Data Warehouse makes it easy to merge data from SQL, Oracle, Excel, and other sources.
Case Study
Summit Credit Union Transforms Mortgage Department with RPA
Summit Credit Union turned to mortgage process automation from Automate to connect Blend and Mortgage Cadence to achieve a streamlined mortgage application process.
On-Demand Webinar
Help Your Organization Overcome Top Challenges with Sequel Data Warehouse
By Alan Jordan
Watch this webinar to learn how a data warehouse can solve three common, yet complex data challenges that you might be facing today.
Guide
A Single Pane of Glass for Multi-Platform Systems Management
Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.
Article
Three Essential Steps to Successful Performance Management
Tue, 08/24/2021
Performance management is often made to look cumbersome and complex, but we’ve distilled the process down to three essential steps.
Article
VIOS Performance Monitoring Commands
By Chuck Losinski on Wed, 03/10/2021
You might think VIOS is set and forget, but it’s not. Luckily, VIOS includes a number of command line utilities to help you obtain performance-related information from your VIOS partitions.
Blog
15 Business Process Automation Examples
Sun, 11/29/2020
Read these 15 top business process automation (BPA) examples and see how your organization can streamline mission-critical processes.
On-Demand Webinar
Ask the Data Warehouse Experts
By Alan Jordan
Watch this webinar for a unique opportunity to hear how a data warehouse can help you further your company's data access.
Article
RPA in Action: Automated COVID-19 Employee Wellness Survey
By Paul Necklen on Thu, 04/02/2020
Watch this example of robotic process automation (RPA) in action and see how you can automatically send employees a COVID-19 wellness survey and track company-wide results.
Blog
The Difference Between BPA and Job Scheduling and When You Need Both
Thu, 02/27/2020
BPA and job scheduling aren't mutually exclusive. In fact, an enterprise may use a job scheduler to support its wider BPA strategy.
Article
Making the Case for PowerVM
By Tom Huntington on Mon, 02/24/2020
Need to make a case to introduce PowerVM into your Power Systems environment? Read this article!
Article
Availability Reporting for Managed Service Providers
By Paul Ratchford on Wed, 02/12/2020
Proving that you are meeting service-level agreements shouldn’t be a wasted effort. In fact, it should strengthen your relationship with clients and help your team manage performance in the future. See how.
Blog
The Top 9 Microsoft Application Tasks You Should be Automating
Fri, 12/27/2019
From Outlook inboxes to Excel spreadsheets to PowerShell scripts, Microsoft is ubiquitous in the work place. Learn how to automate Microsoft application tasks.
On-Demand Webinar
Cybersecurity Trends in 2019 and Predictions for 2020
By Bob Erdman
Count down the top cybersecurity trends of 2019 and hear predictions for what’s to come in 2020. 2020 looks to be just as exciting as 2019, with ample opportunities for organizations to improve their cybersecurity stance.