Introduction to HelpSystems Automation
Optimizing and orchestrating IT automation across a complex, diverse infrastructure requires the right vision—and the right partner—to centralize your workflows and support critical business processes. As organizations embrace digital transformation, they’re finding a new set of challenges holding them back from true change—from juggling multiple unmanageable tools to finding it too expensive to...
The Rise of Single Sign On: Why IBM i Shops Are Scrapping Passwords
By Sandi Moore on Tue, 11/30/2021
Single sign on is on the rise. Watch this on-demand webinar to learn how it can be implemented on IBM i.
Transform Accounts Payable Processes with Intelligent Automation
By Erik Fisher on Tue, 11/23/2021
Whether your data is structured (from a spreadsheet, database, or portal), or unstructured (from emails, forms, and invoices), we’ll show you how an intelligent capture solution can transform your AP processes to save your team hours of manual work, cut back on errors, and save money by avoiding duplicate, late or overcharged invoices.
Security Alert! Prevent FTP and ODBC Data Breaches on IBM i
By Robin Tatam on Fri, 11/19/2021
Watch this informative webinar to learn how to close the “back doors” not covered by traditional security schemes.
How to Convert from AJS or WRKJOBSCDE to Robot Schedule with Ease
By Tom Huntington on Tue, 11/16/2021
Today’s IT teams need automation tools that can help them plan for tomorrow instead of playing catch-up. In this recorded webinar, IBM i experts introduce you to the final phase of your automation evolution: Robot Schedule.
IBM i Automation Series: Performance
By Chuck Losinski on Mon, 11/15/2021
Watch this webinar series for your FREE opportunity to learn what every user should know about Robot Monitor and Performance Navigator software for IBM i (iSeries, AS/400) monitoring, plus advanced tips and tricks.
What the Latest Data Encryption Trends Mean for IBM i
By Sandi Moore on Tue, 11/09/2021
Join IBM i experts Sandi Moore and Chuck Losinski to examine why encryption has become such a hot topic in the cybersecurity community.
I Have All Object Authority and I’m Not Afraid to Use It!
By Robin Tatam on Thu, 10/14/2021
In this webinar, security expert and IBM Champion Robin Tatam explores best practices for All Object authority and strategies for correcting this vulnerability.
Top Considerations When Selecting the Right MFT Software
By Heath Kath on Tue, 10/12/2021
If MFT’s on your IT shopping list, check out these key considerations before making that purchase.