Article
Three Essential Steps to Successful Performance Management
Tue, 08/24/2021
Performance management is often made to look cumbersome and complex, but we’ve distilled the process down to three essential steps.
Article
Performance Navigator vs. IBM PM400
By Randy Watson on Mon, 01/25/2021
This article presents a technical review of how Performance Navigator stacks up as a replacement for IBM Performance Management for Power Systems (PM400).
Article
Why Relying on Scripted Operations Can Be a Problem for Your Business
By Steve Brasen on Tue, 03/31/2020
Scripting provides a powerful platform to automate simple tasks, but overusing custom scripts is hazardous for your business.
Article
I’ve Got *ALLOBJ Authority And I’m Not Afraid To Use It—Part 2
By Robin Tatam on Thu, 06/27/2019
While everyone likes to feel special, we need to be more selective when it comes to data access. As we discussed last month, many users have privileges far beyond their business requirements and simply need to have their access reduced to more reasonable levels.
Article
Remember the IFS!
By Robin Tatam on Thu, 06/27/2019
Ask any security professional which area of IBM i security is most often ignored and chances are that the unanimous response is a chorus of “the Integrated File System.” Although it’s been around since V3R1, the Integrated File System, or IFS, remains a shrouded mystery that represents significant risk to many IBM i organizations.
Article
Capacity Planning and the Culture of Proof
By Timothy Prickett Morgan on Fri, 05/31/2019
Capacity planning is one of the most important things that a company will do, and yet there are still many companies that do it on the back of the envelope. Read this article and learn how to do it right.
Article
Top 5 Capacity Planning Mistakes on IBM i
By Tom Huntington on Tue, 02/12/2019
When it comes to capacity planning for IBM i, skip the shortcuts. This article shares expert recommendations on how to avoid the most common capacity planning mistakes.
Article
If It Has Moving Parts, Someday It's Going to Fail.
Sat, 11/03/2018
Check out IBM's new READ INTENSIVE SSDs.
This is a note to highlight some of the pros and cons - and dig a little deeper into one of the cons - of IBM's recently announced new class of solid state disk drives, "read intensive" (RI) SSDs.
The new RI-SSD comes in one flavor, a 1.86 TB drive. The new concept to wrap your head around is that the drive will "wear out" if you write...
Article
How to Download an ODBC Driver
Wed, 07/25/2018
Performance Navigator® requires an ODBC connection to connect to your IBM i system, but it does not come with your PC’s operating system. IBM has a downloadable they’ve titled Access Client Solutions, which we recommend our customers use to get that ODBC connection.
Article
FAQs about Performance Navigator
Thu, 07/12/2018
Will this product hurt the performance of my IBM i®?
You will not even notice that the product is working. The data gathering software is already part of the OS. I currently have a subscription to IBM's PM for Power service.
How is Performance Navigator compared to PM?
Glad you asked... Performance Navigator uses exactly the same input as PM for Power, Collection Services....
Article
Eight Steps Toward a Secure Hybrid Cloud Environment
Fri, 03/16/2018
Protect your data and your company from internal and external threats by ensuring that your security policies on-premises and in the cloud are aligned with this checklist.
Case Study
Large Health System Turns to Core Privileged Access Manager (BoKS) for Server Management & System Security
A leading not-for-profit health system in the United States, with multiple hospitals, rehabilitation centers, physician clinics, mental health facilities, independent living centers, and home health agencies, employs more than 9,000 individuals, including nearly 1,400 physicians. Collectively, the entities within the healthcare organization also maintain more than 1,500...
Case Study
Leading Global Manufacturing Company Streamlines Administration with Centralized Privileged User Management
Ability to automate ‘what and which’ authentication methods are utilized based on the access request also significantly improves administrator productivity.
Case Study
Top 5 Worldwide Bank Uses Core Privileged Access Manager (BoKS) for Privileged Access Management
Ensuring security and privacy are central to the continued success for one of the largest bank holding company in the United States. With over 13 million individuals and business customers, this full-service banking, brokerage, and investment company understands the importance of protecting customer information.
...