Resources

Case Study

Robotic Process Automation Case Study: Automate Integrates Critical Applications for a Major Medical Center

The University of Texas MD Anderson Cancer Center has the challenge of staffing and managing thousands of nurses busy delivering top-notch patient care. To manage this complexity, MD Anderson relies on three critical applications: a human resource system by PeopleSoft, a time and attendance system by Kronos, and a staffing system by Per-Se's ANSOS One-Staff. These three...
Case Study

Automate Saves Vestcom 200 Hours per Week with GUI Automation

Getting sophisticated signage to the store shelf requires a lot of digital heavy lifting. At Vestcom International, raw product data sent by major retailers and brand manufacturers must be scrubbed, organized, converted to PostScript files, and sorted by variables such as tag type and store location before being transmitted to 10 company production facilities around the country...
Case Study

Automate Eliminates SYSPRO Night Duty for Lab Products Manufacturer

The IT team at World Precision Instruments (WPI) wanted to take back the night on behalf of employees responsible for running reports from the company's SYSPRO ERP system. Instead of requiring employees to manually trigger and generate reports from home at specific hours in a specific sequence on a nightly basis, the company wanted to automate the entire process without...
Case Study

Financial Group Streamlines Loan Origination with Robotic Process Automation

Aldergrove Financial Group is a community-based credit union in Frazier Valley, British Columbia that provides personal and business banking solutions to its 20,000 members. Formed in 1954 under the original name of Otter Farmers’ Institute Credit Union, Aldergrove has since merged with the Matsqui Credit Union and expanded to five branches. Aldergrove is committed to...
Case Study

Automating Crystal Reports with Automate Saves 20 Hours per Week for Appliance Distributor

For wholesale appliance distributor Echelon Home Products, generating and distributing reports for four different business divisions used to require at least 20 hours of weekly Crystal Reports work as well as wreak havoc among employees every Monday because of an all-day report-related network slowdown. That changed in 2008 when Echelon plugged into Automate, the robotic...
Case Study

Pacific Toxicology Laboratories Saves Time with Automate

Pacific Toxicology Laboratories (PacTox), located in Chatsworth, California, is a privately owned company that performs five distinct lab functions under one roof—drug testing, biological monitoring, medical surveillance, therapeutic drug monitoring, and forensic toxicology. PacTox's competitive advantage is its unique ability to provide integrated biological testing services....
Article

Code-Free Database Automation

Watch the recorded webinar to learn how to automate tedious database interaction tasks like data entry, reading incoming data files, and more.
Blog

Cracking the Problem of Endpoint Security

Endpoint security has been a hot topic in the technology and corporate sectors for a few years. Especially with the emergence of bring-your-own-device practices, it has become even more critical to put safeguards in place to ensure the security of sensitive information.
Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
On-Demand Webinar

An Introduction to PCI Compliance on IBM Power Systems

Complying with the PCI standard is a normal part of doing business in today’s credit-centric world. But, PCI applies to multiple platforms. The challenge becomes how to map the general PCI requirements to a specific platform, such as IBM i. And, more importantly, how can you maintain—and prove—compliance?
Guide

Download “Identity & Access Management for IBM i”

      Insiders are responsible for 34 percent of data breaches—and insiders are also the most difficult threat to control control on IBM i. You can't lock them out completely because your IBM i users need at least some level of access to do their jobs. So, how do you ensure users have only the access they need without overburdening IT with manual...
Guide

Controlling SQL Updates Using Powertech Exit Point Manager for IBM i

Over the years, users have relied on commands like STRSQL and RUNSQL to provide instant and powerful access to the data on their Power Systems™ servers. All types of users—from programmers to system administrators to end users—use these commands as their primary interface for extracting and updating data. However, allowing a user to view, update, and even delete data without...