Resources

On-Demand Webinar

IBM i Solution Edition Program Explained

When it comes to hardware and software upgrades, don’t leave anything on the table! Know your options and then talk to your business partner, so you can see a higher return on your POWER9 investment.
On-Demand Webinar

IBM AIX 4th Annual Community Survey Results Revealed

In 1986, IBM launched AIX®, its open standards-based UNIX operating system. Now, more than 30 years later, this popular platform runs on IBM POWER® servers and supports critical applications for organizations around the world. With such a strong presence in IT environments, AIX and its specific usage is of great interest to IT experts as they evaluate their own technology...
Guide

Download the Workload Automation Buyer's Guide

Your First Step Towards Purchasing a Workload Automation Solution We know finding the right workload automation solution for your organization isn’t an easy process. There are dozens of details to consider, from 3rd party integrations, to job monitoring and security concerns, that can make choosing a vendor complex. In this ultimate buyer’s guide, you’ll find the information...
On-Demand Webinar

The Evolution of IBM i in the Data Center

AS/400, iSeries, IBM Power Systems—by any name, IBM i has stood the test of time. This proven technology continues to serve the needs of changing data centers around the world, but can its secrets of past success teach us what to expect next?
Blog

What Is SIEM?

SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.
On-Demand Webinar

IBM i in the Cloud

Wondering about your options for IBM i (iSeries, AS/400) in the cloud? Not sure if cloud is right for your organization? Get your answers from the experts here.
On-Demand Webinar

A CISO’s Take on IBM i Security

In this webinar, IBM i security expert Robin Tatam focuses on helping you change perceptions of IBM i at your organization and getting what you need from your management team.
On-Demand Webinar

Has My IBM i Been Breached?

If your manager asked you to determine whether your IBM i had been breached, what would you do?