Whether you’re searching for strategies, best practices, or industry news, our seasoned experts have created hundreds of helpful resources, filterable by content type, solution, platform, and author. To stay informed, join our email list to get content that matters to you.
Streamlining the Way Companies Create, Capture, Securely Manage, and Distribute their Business Documents Across Processes
Are there uncomfortable gaps in your HA/DR strategy? Read this guide to get everything you need to get started with IBM i high availability.
Query/400 has long been the go-to data access tool. But can it keep up with today's business needs? Find out if it's time to move on from Query/400.
Did you know that IBM i’s origins pre-date the AS/400 server? Read on for IBM i operating system history and the IBM server history that has supported this powerful platform for decades.
This lookbook will walk you through how Sequel harnesses business intelligence (BI) dashboards to improve visibility into your data.
Technology investments around IBM i shouldn’t be scary. The system is built so that the hardware can evolve while your business applications run with little or no interruption. Read on to learn more.
This guide explores the limitations of legacy AS400 schedulers, identifies the signs that it’s time for a change, and points to the benefits of automated operations using modern workload automation software built for IBM i.
Learn how to size your Power10 IBM Power servers with confidence. Download the IBM i capacity planning guide today!
Bring disparate systems, platforms, devices, and applications together in one place and on one screen to make systems management easier and create a consistent and common methodology to varying departments within the IT infrastructure. Combining Halcyon’s Enterprise Console, Operations Center Suite, and Network Server Suite can provide a single pane of glass for managing your IT environment. See how here.
GoAnywhere MFT for IBM i (iSeries) includes native commands for performing PGP encryption and decryption functions directly on the IBM i (formerly known as and often still called AS/400). These commands can be placed...
GoAnywhere MFT will automate and secure file transfers on the IBM i platform using Secure FTP, Open PGP and other popular protocols and encryption standards.
GoAnywhere's IBM MFT can be...
About a year ago, Think Mutual Bank, a bank located in the Midwest, was searching for a way to transfer data between disparate banking systems. Although Think Bank’s core system is the...
Maryland’s Department of Labor, Licensing, and Regulation (DLLR) must transfer sensitive data in a secure and reliable fashion. Besides the challenge of ensuring information is protected in transit, each...
“AS/400 is built to be safe and reliable.”
“No one makes viruses for the IBM i. There are no known cases of malware, either.”
“IBM has amazing IBM i server security, so we don’t have to worry...
Just because your AS/400 hero is about to ride off into the sunset doesn’t mean your IBM i is done for. See how to survive—and thrive—in a post-retirement data center.
To help you stay connected to the thriving IBM i community, we’ve compiled a comprehensive list of IBM i user groups around the world. Read on!
Are you using homegrown processes in your organization to send files on the IBM i? Between the knowledge required to write and maintain file transfer scripts, the time spent on creating user profiles for...
Malware is still one of the most destructive security threats affecting organizations of all sizes, from SMBs to large enterprises and...
Many IT professionals still use the term AS/400. But can a platform that was introduced in 1988 still be relevant today? The answers typically surprise people.
This guide teaches you how to handle IBM i message management, including the fastest and more accurate ways to monitor for messages, filter critical messages, and escalate messages to members of your team as needed.
In every industry, business critical processes depend on application performance. Guard yourself against IBM i performance disasters with resource management and system performance monitoring.