Article
How to Choose the Right Network Monitoring Software for You
By Kevin Jackson on Sun, 12/08/2019
When choosing a network monitoring software, consider these key factors to help find the best solution for your organization.
Article
Too Many Job Schedulers, Not Enough Substance
By Tom Huntington on Wed, 11/20/2019
How many separate job schedulers are you juggling? Don’t let your important processing into a scheduling circus. Stick with a single, sophisticated solution.
Article
Why Should Developers Care About Workload Automation?
By Tom Huntington on Wed, 11/20/2019
Developers, don’t let late-night distress calls from the NOC disrupt your sleep. Workload automation software is not just for operators any more.
Article
Lessons Learned from IBM's Native Scheduler
By Chuck Losinski on Wed, 11/20/2019
Your shop runs more than 30 jobs each day. Your jobs must communicate across IBM i and another OS. You need to monitor them and generate reports for audits or SLAs. Do your existing job schedulers really meet your needs?
Article
Built-in Commands Make Your Enterprise Scheduling Environment Even More Robust
By Chuck Losinski on Wed, 11/20/2019
Looking for better ways to integrate your Windows, AIX/UNIX, and Linux environments with the Robot Schedule scheduling system? Robot Schedule Enterprise commands can enhance your integration experience.
Article
When Should You Replace Your Free SIEM Tools?
By Bob Erdman on Wed, 11/06/2019
Free SIEM tools often come with limitations that will lead security teams to consider commercial options. How do you know when it’s time to upgrade?
Article
Evaluating Security Information and Event Management (SIEM) Solutions: The Pros and Cons of Freeware
By Bob Erdman on Mon, 10/28/2019
F ind out the differences between free SIEM solutions, their pros and cons, and considering enterprise options.
Article
Vityl Capacity Management 2.5 Increases Hybrid Cloud Support
By Scott Adams on Wed, 10/23/2019
Article
Secure Transactions: A PCI-DSS & PA-DSS Overview and Compliance Checklist
By Bob Erdman on Fri, 10/18/2019
A complete overview of what PCI-DSS & PA-DSS is and how to become PCI compliant.
Article
How to Automate Excel Reports
Thu, 10/17/2019
Set up an Excel automation task using Automate, robotic process automation (RPA) software from Fortra. Download a free trial of automation software and automate Excel reports today.
Article
Workload Groups in IBM i 7.4
Wed, 10/02/2019
Did you know? IBM i Workload Groups are a powerful yet under-utilized feature of the operating system that have been made more flexible with IBM i 7.4 (V7R4). Read on to learn more.
Article
Automate 11.2 Enhances RPA Functionality
Mon, 09/30/2019
Discover the latest enhancements to your robotic process automation (RPA) experience with Automate’s 11.2 release.
Article
4 Impactful Tasks to Automate with Desktop Automation Tools
Tue, 09/17/2019
Using desktop automation tools let you work one-on-one with software bots to help you solve problems and simplify daily tasks within your environment. Learn the top four tasks to automate with desktop automation.
Article
How To Automate Web Extraction
Thu, 09/12/2019
As more and more companies and governments make data available online, the demand and need to access and process Internet-based data is growing fast. Problematically, much of the data is available only through a front-end web-app that is designed for ad-hoc queries. If the need is to get bulk amounts of online data, automation becomes essential. Real-world automation requires that any number of...
Article
How Do I Make My Work on IBM i Look Good So My Company Doesn’t Ditch the Platform?
By Donnie MacColl on Wed, 09/11/2019
The good old green screen is no longer your safety blanket. In fact, it could be the final nail in the coffin for IBM i at your company. Consider this your wakeup call from Donnie MacColl.
Article
Empower Your Security Monitor with Powertech SIEM Agent for IBM i
By Robin Tatam on Wed, 08/28/2019
Typically, there are two main issues with monitoring a system manually: having to go out deliberately (and repeatedly) and check to see if something has happened; and the fact that you are most likely looking for the proverbial needle in a haystack of logged events.