Resources

Case Study

Victaulic makes Short Work of Ad Hoc Queries with Surveyor/400

Ad hoc queries and reports are the bane of many IT departments. The need to churn out frequent, one-off, "must have" data queries for users can be a significant drain on developers' time. Users can't be blamed for the numerous impromptu requests. Customer service, continuous improvement, and the maintenance of competitive advantage demand that business people regularly look at data in innovative...
Guide

Maximizing Your RPA ROI

Learn how you can maximize RPA ROI with a long-term vision, knowledge of potential costs, and the savings that come from implementing an RPA solution.
Guide

The Robotic Process Automation Toolkit

Automating tasks is easy, but building an automation center of excellence to promote strategic automation in your organization takes more planning. Based on our years of experience helping enterprises automate, we’ve compiled a collection of robotic process automation tools and resources to set you up for automation success. The toolkit is designed to guide you through all the steps of your...
Case Study

How Peoples Telephone Reboots Equipment Instantly with Network Monitoring & Automation

What if you could reduce an eight-hour outage… to no time at all? That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night...
Guide

Download "IBM i Encryption: How to Protect Your Database"

Learn your options for encrypting IBM i data. Sensitive information needs to be kept secret. That’s an indisputable fact for modern organizations, where sensitive information can include customers’ personally identifiable information, customer lists, and intellectual property. Encryption is widely recognized as the most effective way to ensure private information is accessible only by authorized...
Guide

Download "Why Managed Services Is Becoming IT Security’s Top Trend"

It’s time to reconsider traditional approaches to cybersecurity. Handling IT security in-house is the norm at most organizations. But no matter what industry you operate in, there’s one fact you can’t ignore: cybersecurity is more complex than ever. With technology and threats changing rapidly, does it still make sense to rely solely on internal resources? Many organizations are beginning to see...
Guide

Download "File Integrity Monitoring for Power Systems Running IBM i"

Data breaches have increased dramatically in the past 10 years. In response, numerous regulatory standards have been created, including the Sarbanes-Oxley Act, HIPAA, and PCI DSS. These standards require organizations to adopt security best practices. One key best practice is file integrity monitoring (FIM): making sure any changes made to server configurations and critical application data are...
Case Study

TransAlta Prevents Data Loss with Robotic Process Automation from Automate

TransAlta Corporation is a multinational power generation and wholesale marketing company with yearly revenue of about $2.5 billion. Based in Canada, TransAlta manages the production and delivery of energy resources over a wide geographical expanse. This requires a sophisticated network of control systems for thousands of pumps, valves, gas turbines, high voltage breakers, and more. In the Ontario...
Case Study

Children's Museum Creates One-of-a-Kind Interactive Exhibit Using Automate

The Children's Museum of Science and Technology in Troy, New York was founded in 1954 and is located in the Rensselaer Technology Park. Its mission is to be the premier science center in the New York Capital Region where kids and parents can explore, discover, and imagine the world of science together.
Case Study

30 Minutes of Automating Cuts Infor ERP VISUAL Work by an Hour a Day

In the quest for IT efficiency, one way to save time is to automate the daily grind of launching and monitoring ERP system utilities. Washington-based job shop Magic Metals, Inc., sought to do just that when it implemented Infor ERP VISUAL, but the company's busy IT manager did not have time to write custom scripts to enable VISUAL utilities to self-execute. Instead, he turned to the pre...
Case Study

Manufacturer Cuts 2 ½ Hours of Daily ERP Work with Automate

For years, an IT staffer at ITW Construction Products had to come to work early every morning to prepare the company's ERP system for the new day. At first, the process of incorporating the previous day's business activities into the ERP database took thirty minutes. As the company grew, the job ballooned to 2 ½ hours. Rather than continuing to waste valuable time repeating the same tasks day...
Guide

Download "New York's Cybersecurity Regulation: How It Affects IT Professionals Everywhere"

New York’s new cybersecurity law will affect organizations across the U.S. And its stringent requirements set a high standard for cybersecurity and data protection. In this guide, you’ll learn how this law reaches organizations beyond New York’s borders and why many other states are expected to follow suit. The guide features an easy-to-follow breakdown of the law’s most important requirements and...
Guide

Download "Secure Inside and Out: Maximizing Intrusion Detection and Prevention on IBM i"

Data leaks and operational disruptions can come from any source—internal or external. To protect sensitive data from modern cyberthreats, all organizations need a robust intrusion detection and prevention system (IDS/IPS). The IBM i operating system includes advanced capabilities for detecting and preventing external threats, but there are still gaps that must be filled. Download this guide for...
Case Study

Automate Streamlines Lottery Operations and Reporting in Louisiana

Louisiana Lottery Corporation was created in 1991 by the Louisiana state legislature with the idea of generating revenue without increasing taxes. Its mission is to organize, manage, and oversee the operations which support the Louisiana Lottery. Responsibilities entail all collections, accounting, auditing, reporting, and support for the thousands of retailers who sell lottery tickets for games...
Guide

Which IBM i Data Access Tool is Right for You?

Data access software is essential today to both technical users—like your IT team—and business users—like everyone else. Query/400 has long been the go-to for IBM i data access. It’s been around for over 30 years, but the tool hasn’t advanced with changes in technology. That’s where modern data access tools like Sequel have the advantage. But how do you really know which data access tool is right...
Case Study

Robotic Process Automation Case Study: Automate Integrates Critical Applications for a Major Medical Center

The University of Texas MD Anderson Cancer Center has the challenge of staffing and managing thousands of nurses busy delivering top-notch patient care. To manage this complexity, MD Anderson relies on three critical applications: a human resource system by PeopleSoft, a time and attendance system by Kronos, and a staffing system by Per-Se's ANSOS One-Staff. These three applications (with their...
Case Study

Automate Saves Vestcom 200 Hours per Week with GUI Automation

Getting sophisticated signage to the store shelf requires a lot of digital heavy lifting. At Vestcom International, raw product data sent by major retailers and brand manufacturers must be scrubbed, organized, converted to PostScript files, and sorted by variables such as tag type and store location before being transmitted to 10 company production facilities around the country for printing and...